@inproceedings{CeccatoPNCT07, title = {Barrier Slicing for Remote Software Trusting}, author = {Mariano Ceccato and Mila Dalla Preda and Jasvir Nagra and Christian S. Collberg and Paolo Tonella}, year = {2007}, doi = {10.1109/SCAM.2007.27}, url = {http://dx.doi.org/10.1109/SCAM.2007.27}, tags = {slicing}, researchr = {https://researchr.org/publication/CeccatoPNCT07}, cites = {0}, citedby = {0}, pages = {27-36}, booktitle = {Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France}, publisher = {IEEE}, } @inproceedings{CollbergDP00, title = {Language-Agnostic Program Rendering for Presentation, Debugging and Visualization}, author = {Christian S. Collberg and Sean Davey and Todd A. Proebsting}, year = {2000}, url = {http://www.computer.org/proceedings/vl/0840/08400183abs.htm}, tags = {programming languages, debugging}, researchr = {https://researchr.org/publication/CollbergDP00}, cites = {0}, citedby = {0}, pages = {183-190}, booktitle = {VL}, } @inproceedings{Collberg02, title = {A Fuzzy Visual Query Language for a Domain-Specific Web Search Engine}, author = {Christian S. Collberg}, year = {2002}, url = {http://link.springer.de/link/service/series/0558/bibs/2317/23170176.htm}, tags = {search, query language, domain-specific language}, researchr = {https://researchr.org/publication/Collberg02}, cites = {0}, citedby = {0}, pages = {176-190}, booktitle = {Diagrammatic Representation and Inference, Second International Conference, Diagrams 2002, Callaway Gardens, GA, USA, April 18-20, 2002, Proceedings}, editor = {Mary Hegarty and Bernd Meyer and N. Hari Narayanan}, volume = {2317}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-43561-1}, } @inproceedings{HeffnerC04, title = {The Obfuscation Executive}, author = {Kelly Heffner and Christian S. Collberg}, year = {2004}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3225&spage=428}, researchr = {https://researchr.org/publication/HeffnerC04}, cites = {0}, citedby = {0}, pages = {428-440}, booktitle = {Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, editor = {Kan Zhang and Yuliang Zheng}, volume = {3225}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-23208-7}, } @inproceedings{NagraTC02, title = {A Functional Taxonomy for Software Watermarking}, author = {Jasvir Nagra and Clark D. Thomborson and Christian S. Collberg}, year = {2002}, url = {http://crpit.com/confpapers/CRPITV4Nagra.ps}, tags = {watermarking, taxonomy}, researchr = {https://researchr.org/publication/NagraTC02}, cites = {0}, citedby = {0}, pages = {177-186}, booktitle = {Computer Science 2002, Twenty-Fifth Australasian Computer Science Conference (ACSC2002), Monash University, Melbourne, Victoria, January/February 2002}, editor = {Michael J. Oudshoorn}, volume = {4}, series = {CRPIT}, publisher = {Australian Computer Society}, isbn = {0-909-92582-8}, } @inproceedings{MylesC05, title = {K-gram based software birthmarks}, author = {Ginger Myles and Christian S. Collberg}, year = {2005}, doi = {10.1145/1066677.1066753}, url = {http://doi.acm.org/10.1145/1066677.1066753}, tags = {rule-based}, researchr = {https://researchr.org/publication/MylesC05}, cites = {0}, citedby = {0}, pages = {314-318}, booktitle = {Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005}, editor = {Hisham Haddad and Lorie M. Liebrock and Andrea Omicini and Roger L. Wainwright}, publisher = {ACM}, isbn = {1-58113-964-0}, } @inproceedings{CollbergHCT04, title = {Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks}, author = {Christian S. Collberg and Andrew Huntwork and Edward Carter and Gregg M. Townsend}, year = {2004}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3200&spage=192}, tags = {watermarking, analysis, graph-rewriting, rewriting}, researchr = {https://researchr.org/publication/CollbergHCT04}, cites = {0}, citedby = {0}, pages = {192-207}, booktitle = {Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers}, editor = {Jessica J. Fridrich}, volume = {3200}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-24207-4}, } @article{CollbergS05, title = {Software watermarking in the frequency domain: Implementation, analysis, and attacks}, author = {Christian S. Collberg and Tapas Ranjan Sahoo}, year = {2005}, url = {http://iospress.metapress.com/openurl.asp?genre=article&issn=0926-227X&volume=13&issue=5&spage=721}, tags = {watermarking, domain analysis, analysis}, researchr = {https://researchr.org/publication/CollbergS05}, cites = {0}, citedby = {0}, journal = {Journal of Computer Security}, volume = {13}, number = {5}, pages = {721-755}, } @article{CeccatoPNCT09, title = {Trading-off security and performance in barrier slicing for remote software entrusting}, author = {Mariano Ceccato and Mila Dalla Preda and Jasvir Nagra and Christian S. Collberg and Paolo Tonella}, year = {2009}, doi = {10.1007/s10515-009-0047-y}, url = {http://dx.doi.org/10.1007/s10515-009-0047-y}, tags = {slicing, security}, researchr = {https://researchr.org/publication/CeccatoPNCT09}, cites = {0}, citedby = {0}, journal = {Automated Software Engineering}, volume = {16}, number = {2}, pages = {235-261}, } @article{CollbergTT07, title = {Dynamic graph-based software fingerprinting}, author = {Christian S. Collberg and Clark D. Thomborson and Gregg M. Townsend}, year = {2007}, doi = {10.1145/1286821.1286826}, url = {http://doi.acm.org/10.1145/1286821.1286826}, tags = {rule-based, graph-rewriting, rewriting}, researchr = {https://researchr.org/publication/CollbergTT07}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Programming Languages and Systems}, volume = {29}, number = {6}, pages = {35}, } @article{CollbergMS07, title = {An empirical study of Java bytecode programs}, author = {Christian S. Collberg and Ginger Myles and Michael Stepp}, year = {2007}, doi = {10.1002/spe.776}, url = {http://dx.doi.org/10.1002/spe.776}, tags = {empirical, Java}, researchr = {https://researchr.org/publication/CollbergMS07}, cites = {0}, citedby = {0}, journal = {Software: Practice and Experience}, volume = {37}, number = {6}, pages = {581-641}, } @inproceedings{CollbergKLS03, title = {SPLAT: A System for Self-Plagiarism Detection}, author = {Christian S. Collberg and Stephen G. Kobourov and Joshua Louie and Thomas Slattery}, year = {2003}, researchr = {https://researchr.org/publication/CollbergKLS03}, cites = {0}, citedby = {0}, pages = {508-514}, booktitle = {Proceedings of the IADIS International Conference WWW/Internet 2003, ICWI 2003, Algarve, Portugal, November 5-8, 2003}, publisher = {IADIS}, isbn = {972-98947-1-X}, } @inproceedings{CollbergK87, title = {A Property-Based Method for Selecting Among Multiple Implementations of Modules}, author = {Christian S. Collberg and Magnus G. Krampell}, year = {1987}, tags = {rule-based}, researchr = {https://researchr.org/publication/CollbergK87}, cites = {0}, citedby = {0}, pages = {193-201}, booktitle = {ESEC 87, 1st European Software Engineering Conference, Strasbourg, France, September 9-11, 1987, Proceedings}, editor = {Howard K. Nichols and Dan Simpson}, volume = {289}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-18712-X}, } @inproceedings{Collberg94, title = {Distributed High-Level Module Binding for Flexible Encapsulation and Fast Inter-Modular Optimization}, author = {Christian S. Collberg}, year = {1994}, tags = {optimization}, researchr = {https://researchr.org/publication/Collberg94}, cites = {0}, citedby = {0}, pages = {282-297}, booktitle = {Programming Languages and System Architectures, International Conference, Zurich, Switzerland, March 2-4, 1994, Proceedings}, editor = {Jürg Gutknecht}, volume = {782}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-57840-4}, } @inproceedings{MylesC04, title = {Detecting Software Theft via Whole Program Path Birthmarks}, author = {Ginger Myles and Christian S. Collberg}, year = {2004}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3225&spage=404}, researchr = {https://researchr.org/publication/MylesC04}, cites = {0}, citedby = {0}, pages = {404-415}, booktitle = {Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, editor = {Kan Zhang and Yuliang Zheng}, volume = {3225}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-23208-7}, } @article{Collberg02:0, title = {Automatic derivation of compiler machine descriptions}, author = {Christian S. Collberg}, year = {2002}, doi = {10.1145/567097.567100}, url = {http://doi.acm.org/10.1145/567097.567100}, tags = {compiler}, researchr = {https://researchr.org/publication/Collberg02%3A0}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Programming Languages and Systems}, volume = {24}, number = {4}, pages = {369-408}, } @article{CollbergP04, title = {Problem identification using program checking}, author = {Christian S. Collberg and Todd A. Proebsting}, year = {2004}, doi = {10.1016/j.dam.2003.11.005}, url = {http://dx.doi.org/10.1016/j.dam.2003.11.005}, researchr = {https://researchr.org/publication/CollbergP04}, cites = {0}, citedby = {0}, journal = {Discrete Applied Mathematics}, volume = {144}, number = {3}, pages = {270-280}, } @inproceedings{CollbergT99, title = {Software Watermarking: Models and Dynamic Embeddings}, author = {Christian S. Collberg and Clark D. Thomborson}, year = {1999}, doi = {10.1145/292540.292569}, url = {http://doi.acm.org/10.1145/292540.292569}, tags = {embedded software, watermarking}, researchr = {https://researchr.org/publication/CollbergT99}, cites = {0}, citedby = {0}, pages = {311-324}, booktitle = {POPL}, } @inproceedings{CollbergKW04, title = {AlgoVista: an algorithmic search tool in an educational setting}, author = {Christian S. Collberg and Stephen G. Kobourov and Suzanne Westbrook}, year = {2004}, doi = {10.1145/971300.971457}, url = {http://doi.acm.org/10.1145/971300.971457}, tags = {search}, researchr = {https://researchr.org/publication/CollbergKW04}, cites = {0}, citedby = {0}, pages = {462-466}, booktitle = {Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004, Norfolk, Virginia, USA, March 3-7, 2004}, editor = {Dan Joyce and Deborah Knox and Wanda Dann and Thomas L. Naps}, publisher = {ACM}, isbn = {1-58113-798-2}, } @inproceedings{CollbergKCT03, title = {Graph-Based Approaches to Software Watermarking}, author = {Christian S. Collberg and Stephen G. Kobourov and Edward Carter and Clark D. Thomborson}, year = {2003}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2880&spage=156}, tags = {rule-based, watermarking, graph-rewriting, rewriting, systematic-approach}, researchr = {https://researchr.org/publication/CollbergKCT03}, cites = {0}, citedby = {0}, pages = {156-167}, booktitle = {Graph-Theoretic Concepts in Computer Science, 29th International Workshop, WG 2003, Elspeet, The Netherlands, June 19-21, 2003, Revised Papers}, editor = {Hans Leo Bodlaender}, volume = {2880}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-20452-0}, } @article{CollbergT02, title = {Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection}, author = {Christian S. Collberg and Clark D. Thomborson}, year = {2002}, url = {http://www.computer.org:80/tse/ts2002/e0735abs.htm}, tags = {watermarking}, researchr = {https://researchr.org/publication/CollbergT02}, cites = {0}, citedby = {0}, journal = {IEEE Trans. Software Eng.}, volume = {28}, number = {8}, pages = {735-746}, } @inproceedings{CollbergKNPW03, title = {A System for Graph-Based Visualization of the Evolution of Software}, author = {Christian S. Collberg and Stephen G. Kobourov and Jasvir Nagra and Jacob Pitts and Kevin Wampler}, year = {2003}, tags = {rule-based, software evolution, graph-rewriting, rewriting}, researchr = {https://researchr.org/publication/CollbergKNPW03}, cites = {0}, citedby = {0}, pages = {77}, booktitle = {Proceedings ACM 2003 Symposium on Software Visualization, San Diego, California, USA, June 11-13, 2003}, editor = {Stephan Diehl and John T. Stasko and Stephen N. Spencer}, publisher = {ACM}, isbn = {1-58113-642-0}, } @inproceedings{CollbergTL98, title = {Breaking Abstractions and Unstructuring Data Structures}, author = {Christian S. Collberg and Clark D. Thomborson and Douglas Low}, year = {1998}, url = {http://computer.org/proceedings/iccl/8454/84540028abs.htm}, tags = {data-flow, abstraction}, researchr = {https://researchr.org/publication/CollbergTL98}, cites = {0}, citedby = {0}, pages = {28-38}, booktitle = {ICCL}, } @inproceedings{CollbergHBU05, title = {SLINKY: Static Linking Reloaded}, author = {Christian S. Collberg and John H. Hartman and Sridivya Babu and Sharath K. Udupa}, year = {2005}, url = {http://www.usenix.org/events/usenix05/tech/general/collberg.html}, researchr = {https://researchr.org/publication/CollbergHBU05}, cites = {0}, citedby = {0}, pages = {309-322}, booktitle = {Proceedings of the 2005 USENIX Annual Technical Conference, April 10-15, 2005, Anaheim, CA, USA}, publisher = {USENIX}, } @article{MylesC06, title = {Software watermarking via opaque predicates: Implementation, analysis, and attacks}, author = {Ginger Myles and Christian S. Collberg}, year = {2006}, doi = {10.1007/s10660-006-6955-z}, url = {http://dx.doi.org/10.1007/s10660-006-6955-z}, tags = {watermarking, analysis}, researchr = {https://researchr.org/publication/MylesC06}, cites = {0}, citedby = {0}, journal = {Electronic Commerce Research}, volume = {6}, number = {2}, pages = {155-171}, } @inproceedings{SnodgrassYC04, title = {Tamper Detection in Audit Logs}, author = {Richard T. Snodgrass and Shilong (Stanley) Yao and Christian S. Collberg}, year = {2004}, url = {http://www.vldb.org/conf/2004/RS13P1.PDF}, researchr = {https://researchr.org/publication/SnodgrassYC04}, cites = {0}, citedby = {0}, pages = {504-515}, booktitle = {(e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, Toronto, Canada, August 31 - September 3 2004}, editor = {Mario A. Nascimento and M. Tamer Özsu and Donald Kossmann and Renée J. Miller and José A. Blakeley and K. Bernhard Schiefer}, publisher = {Morgan Kaufmann}, isbn = {0-12-088469-0}, } @inproceedings{CollbergCDHKLS04, title = {Dynamic path-based software watermarking}, author = {Christian S. Collberg and Edward Carter and Saumya K. Debray and Andrew Huntwork and John D. Kececioglu and Cullen Linn and Michael Stepp}, year = {2004}, doi = {10.1145/996841.996856}, url = {http://doi.acm.org/10.1145/996841.996856}, tags = {rule-based, watermarking}, researchr = {https://researchr.org/publication/CollbergCDHKLS04}, cites = {0}, citedby = {0}, pages = {107-118}, booktitle = {Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, Washington, DC, USA, June 9-11, 2004}, editor = {William Pugh and Craig Chambers}, publisher = {ACM}, isbn = {1-58113-807-5}, } @article{CollbergK05, title = {Self-plagiarism in computer science}, author = {Christian S. Collberg and Stephen G. Kobourov}, year = {2005}, doi = {10.1145/1053291.1053293}, url = {http://doi.acm.org/10.1145/1053291.1053293}, tags = {reuse, data-flow, e-science, context-aware, plagiarism, self-plagiarism}, researchr = {https://researchr.org/publication/CollbergK05}, cites = {0}, citedby = {0}, journal = {Communications of the ACM}, volume = {48}, number = {4}, pages = {88-94}, } @inproceedings{Collberg89, title = {Data Structures, Algorithms, and Software Engineering}, author = {Christian S. Collberg}, year = {1989}, tags = {data-flow, software engineering}, researchr = {https://researchr.org/publication/Collberg89}, cites = {0}, citedby = {0}, pages = {70-79}, booktitle = {Software Engineering Education, SEI Conference 1989, Pittsburgh, Pennsylvania, USA, July 18-21, 1989, Proceedings}, editor = {Norman E. Gibbs}, volume = {376}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-97090-8}, } @inproceedings{KobourovCKSTY03, title = {TetraTetris: A Study of Multi-User Touch-Based Interaction Using DiamondTouch}, author = {Stephen G. Kobourov and Christian S. Collberg and Steven Kobes and Ben Smith and S. Trush and Gary V. Yee}, year = {2003}, tags = {rule-based}, researchr = {https://researchr.org/publication/KobourovCKSTY03}, cites = {0}, citedby = {0}, booktitle = {Human-Computer Interaction INTERACT 03: IFIP TC13 International Conference on Human-Computer Interaction, 1st-5th September 2003, Zurich, Switzerland}, editor = {Matthias Rauterberg and Marino Menozzi and Janet Wesson}, publisher = {IOS Press}, isbn = {1-58603-363-8}, } @inproceedings{CollbergTL:POPL:1998, title = {Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs}, author = {Christian S. Collberg and Clark D. Thomborson and Douglas Low}, year = {1998}, doi = {10.1145/268946.268962}, url = {http://doi.acm.org/10.1145/268946.268962}, tags = {model-to-model transformation, rule-based, transformation engineering, Java, program analysis, reverse engineering, obfuscation, points-to analysis, analysis, static analysis, data-flow programming, data-flow, source-to-source, software engineering, model-driven engineering, model transformation, data-flow analysis, design, open-source, transformation, program transformation}, researchr = {https://researchr.org/publication/CollbergTL%3APOPL%3A1998}, cites = {0}, citedby = {0}, pages = {184-196}, booktitle = {Proceedings of the 25th {ACM SIGPLAN-SIGACT} symposium on Principles of programming languages}, address = {New York, NY, USA}, publisher = {ACM}, } @inproceedings{Collberg97, title = {Reverse Interpretation + Mutation Analysis = Automatic Retargeting}, author = {Christian S. Collberg}, year = {1997}, tags = {analysis}, researchr = {https://researchr.org/publication/Collberg97}, cites = {0}, citedby = {0}, pages = {57-70}, booktitle = {PLDI}, } @inproceedings{MylesC03, title = {Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks}, author = {Ginger Myles and Christian S. Collberg}, year = {2003}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2971&spage=274}, tags = {watermarking, analysis}, researchr = {https://researchr.org/publication/MylesC03}, cites = {0}, citedby = {0}, pages = {274-293}, booktitle = {Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, editor = {Jong In Lim and Dong-Hoon Lee}, volume = {2971}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-21376-7}, } @article{CollbergMH03, title = {Sandmark--A Tool for Software Protection Research}, author = {Christian S. Collberg and Ginger Myles and Andrew Huntwork}, year = {2003}, doi = {10.1109/MSECP.2003.1219058}, url = {http://doi.ieeecomputersociety.org/10.1109/MSECP.2003.1219058}, researchr = {https://researchr.org/publication/CollbergMH03}, cites = {0}, citedby = {0}, journal = {IEEE Security & Privacy}, volume = {1}, number = {4}, pages = {40-49}, } @article{MylesCHN05, title = {The evaluation of two software watermarking algorithms}, author = {Ginger Myles and Christian S. Collberg and Zachary V. Heidepriem and Armand Navabi}, year = {2005}, doi = {10.1002/spe.657}, url = {http://dx.doi.org/10.1002/spe.657}, tags = {watermarking}, researchr = {https://researchr.org/publication/MylesCHN05}, cites = {0}, citedby = {0}, journal = {Software: Practice and Experience}, volume = {35}, number = {10}, pages = {923-938}, } @inproceedings{CollbergKMW02, title = {AlambdagoVista: a tool to enhance algorithm design and understanding}, author = {Christian S. Collberg and Stephen G. Kobourov and Jessica Miller and Suzanne Westbrook}, year = {2002}, doi = {10.1145/544414.544496}, url = {http://doi.acm.org/10.1145/544414.544496}, tags = {design}, researchr = {https://researchr.org/publication/CollbergKMW02}, cites = {0}, citedby = {0}, pages = {228}, booktitle = {Proceedings of the 7th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2002, Aarhus, Denmark, June 24-28, 2002}, editor = {Michael E. Caspersen and Dan Joyce and Don Goelman and Ian Utting}, publisher = {ACM}, isbn = {1-58113-499-1}, } @proceedings{ih:2006, title = {Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, year = {2007}, tags = {information hiding}, researchr = {https://researchr.org/publication/ih%3A2006}, cites = {0}, citedby = {0}, booktitle = {Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, conference = {ih}, editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil Sallee}, volume = {4437}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-74123-7}, }