Christian Collberg
Christian Collberg
Professor of Computer Science, University of Arizona
Verified email at cs.arizona.edu - Homepage
Title
Cited by
Cited by
Year
A taxonomy of obfuscating transformations
C Collberg, C Thomborson, D Low
Technical Report 148, Department of Computer Science, University of Auckland, 1997
13271997
Watermarking, tamper-proofing, and obfuscation-tools for software protection
CS Collberg, C Thomborson
IEEE Transactions on software engineering 28 (8), 735-746, 2002
10912002
Manufacturing cheap, resilient, and stealthy opaque constructs
C Collberg, C Thomborson, D Low
Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of …, 1998
7601998
Obfuscation techniques for enhancing software security
CS Collberg, CD Thomborson, DWK Low
US Patent 6,668,325, 2003
5852003
Software watermarking: Models and dynamic embeddings
C Collberg, C Thomborson
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of …, 1999
5611999
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection
J Nagra, C Collberg
Pearson Education, 2009
4132009
A system for graph-based visualization of the evolution of software
C Collberg, S Kobourov, J Nagra, J Pitts, K Wampler
Proceedings of the 2003 ACM symposium on Software visualization, 77-ff, 2003
3012003
Breaking abstractions and unstructuring data structures
C Collberg, C Thomborson, D Low
Proceedings of the 1998 International Conference on Computer Languages (Cat …, 1998
2621998
K-gram based software birthmarks
G Myles, C Collberg
Proceedings of the 2005 ACM symposium on Applied computing, 314-318, 2005
2402005
Self-plagiarism in computer science
C Collberg, S Kobourov
Communications of the ACM 48 (4), 88-94, 2005
239*2005
Dynamic path-based software watermarking
C Collberg, E Carter, S Debray, A Huntwork, J Kececioglu, C Linn, ...
Proceedings of the ACM SIGPLAN 2004 conference on Programming language …, 2004
1992004
Detecting software theft via whole program path birthmarks
G Myles, C Collberg
International Conference on Information Security, 404-415, 2004
1832004
Sandmark-a tool for software protection research
C Collberg, GR Myles, A Huntwork
IEEE security & privacy 1 (4), 40-49, 2003
1692003
Tamper detection in audit logs
RT Snodgrass, SS Yao, C Collberg
Proceedings of the Thirtieth international conference on Very large data …, 2004
1542004
Repeatability in computer systems research
C Collberg, TA Proebsting
Communications of the ACM 59 (3), 62-69, 2016
1362016
Software watermarking via opaque predicates: Implementation, analysis, and attacks
G Myles, C Collberg
Electronic Commerce Research 6 (2), 155-171, 2006
1052006
On the limits of software watermarking
C Collberg, C Thomborson, D Low
Technical Report, 1998
1001998
Code obfuscation against symbolic execution attacks
S Banescu, C Collberg, V Ganesh, Z Newsham, A Pretschner
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
872016
An empirical study of Java bytecode programs
C Collberg, G Myles, M Stepp
Software: Practice and Experience 37 (6), 581-641, 2007
832007
Software watermarking through register allocation: Implementation, analysis, and attacks
G Myles, C Collberg
International Conference on Information Security and Cryptology, 274-293, 2003
832003
The system can't perform the operation now. Try again later.
Articles 1–20