@inproceedings{CeccatoPNCT07, title = {Barrier Slicing for Remote Software Trusting}, author = {Mariano Ceccato and Mila Dalla Preda and Jasvir Nagra and Christian S. Collberg and Paolo Tonella}, year = {2007}, doi = {10.1109/SCAM.2007.27}, url = {http://dx.doi.org/10.1109/SCAM.2007.27}, tags = {slicing}, researchr = {https://researchr.org/publication/CeccatoPNCT07}, cites = {0}, citedby = {0}, pages = {27-36}, booktitle = {SCAM}, } @inproceedings{CollbergDP00, title = {Language-Agnostic Program Rendering for Presentation, Debugging and Visualization}, author = {Christian S. Collberg and Sean Davey and Todd A. Proebsting}, year = {2000}, url = {http://www.computer.org/proceedings/vl/0840/08400183abs.htm}, tags = {programming languages, debugging}, researchr = {https://researchr.org/publication/CollbergDP00}, cites = {0}, citedby = {0}, pages = {183-190}, booktitle = {vl}, } @inproceedings{Collberg02, title = {A Fuzzy Visual Query Language for a Domain-Specific Web Search Engine}, author = {Christian S. Collberg}, year = {2002}, url = {http://link.springer.de/link/service/series/0558/bibs/2317/23170176.htm}, tags = {search, query language, domain-specific language}, researchr = {https://researchr.org/publication/Collberg02}, cites = {0}, citedby = {0}, pages = {176-190}, booktitle = {diagrams}, } @inproceedings{HeffnerC04, title = {The Obfuscation Executive}, author = {Kelly Heffner and Christian S. Collberg}, year = {2004}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3225&spage=428}, researchr = {https://researchr.org/publication/HeffnerC04}, cites = {0}, citedby = {0}, pages = {428-440}, booktitle = {iiswc}, } @inproceedings{NagraTC02, title = {A Functional Taxonomy for Software Watermarking}, author = {Jasvir Nagra and Clark D. Thomborson and Christian S. Collberg}, year = {2002}, url = {http://crpit.com/confpapers/CRPITV4Nagra.ps}, tags = {watermarking, taxonomy}, researchr = {https://researchr.org/publication/NagraTC02}, cites = {0}, citedby = {0}, pages = {177-186}, booktitle = {acsc}, } @inproceedings{MylesC05, title = {K-gram based software birthmarks}, author = {Ginger Myles and Christian S. Collberg}, year = {2005}, doi = {10.1145/1066677.1066753}, url = {http://doi.acm.org/10.1145/1066677.1066753}, tags = {rule-based}, researchr = {https://researchr.org/publication/MylesC05}, cites = {0}, citedby = {0}, pages = {314-318}, booktitle = {SAC}, } @inproceedings{CollbergHCT04, title = {Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks}, author = {Christian S. Collberg and Andrew Huntwork and Edward Carter and Gregg M. Townsend}, year = {2004}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3200&spage=192}, tags = {watermarking, analysis, graph-rewriting, rewriting}, researchr = {https://researchr.org/publication/CollbergHCT04}, cites = {0}, citedby = {0}, pages = {192-207}, booktitle = {ih}, } @article{CollbergS05, title = {Software watermarking in the frequency domain: Implementation, analysis, and attacks}, author = {Christian S. Collberg and Tapas Ranjan Sahoo}, year = {2005}, url = {http://iospress.metapress.com/openurl.asp?genre=article&issn=0926-227X&volume=13&issue=5&spage=721}, tags = {watermarking, domain analysis, analysis}, researchr = {https://researchr.org/publication/CollbergS05}, cites = {0}, citedby = {0}, journal = {jcs}, volume = {13}, number = {5}, pages = {721-755}, } @article{CeccatoPNCT09, title = {Trading-off security and performance in barrier slicing for remote software entrusting}, author = {Mariano Ceccato and Mila Dalla Preda and Jasvir Nagra and Christian S. Collberg and Paolo Tonella}, year = {2009}, doi = {10.1007/s10515-009-0047-y}, url = {http://dx.doi.org/10.1007/s10515-009-0047-y}, tags = {slicing, security}, researchr = {https://researchr.org/publication/CeccatoPNCT09}, cites = {0}, citedby = {0}, journal = {ASE}, volume = {16}, number = {2}, pages = {235-261}, } @article{CollbergTT07, title = {Dynamic graph-based software fingerprinting}, author = {Christian S. Collberg and Clark D. Thomborson and Gregg M. Townsend}, year = {2007}, doi = {10.1145/1286821.1286826}, url = {http://doi.acm.org/10.1145/1286821.1286826}, tags = {rule-based, graph-rewriting, rewriting}, researchr = {https://researchr.org/publication/CollbergTT07}, cites = {0}, citedby = {0}, journal = {TOPLAS}, volume = {29}, number = {6}, pages = {35}, } @article{CollbergMS07, title = {An empirical study of Java bytecode programs}, author = {Christian S. Collberg and Ginger Myles and Michael Stepp}, year = {2007}, doi = {10.1002/spe.776}, url = {http://dx.doi.org/10.1002/spe.776}, tags = {empirical, Java}, researchr = {https://researchr.org/publication/CollbergMS07}, cites = {0}, citedby = {0}, journal = {SPE}, volume = {37}, number = {6}, pages = {581-641}, } @inproceedings{CollbergKLS03, title = {SPLAT: A System for Self-Plagiarism Detection}, author = {Christian S. Collberg and Stephen G. Kobourov and Joshua Louie and Thomas Slattery}, year = {2003}, researchr = {https://researchr.org/publication/CollbergKLS03}, cites = {0}, citedby = {0}, pages = {508-514}, booktitle = {iadis}, } @inproceedings{CollbergK87, title = {A Property-Based Method for Selecting Among Multiple Implementations of Modules}, author = {Christian S. Collberg and Magnus G. Krampell}, year = {1987}, tags = {rule-based}, researchr = {https://researchr.org/publication/CollbergK87}, cites = {0}, citedby = {0}, pages = {193-201}, booktitle = {ESEC/FSE}, } @inproceedings{Collberg94, title = {Distributed High-Level Module Binding for Flexible Encapsulation and Fast Inter-Modular Optimization}, author = {Christian S. Collberg}, year = {1994}, tags = {optimization}, researchr = {https://researchr.org/publication/Collberg94}, cites = {0}, citedby = {0}, pages = {282-297}, booktitle = {plsa}, } @inproceedings{MylesC04, title = {Detecting Software Theft via Whole Program Path Birthmarks}, author = {Ginger Myles and Christian S. Collberg}, year = {2004}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3225&spage=404}, researchr = {https://researchr.org/publication/MylesC04}, cites = {0}, citedby = {0}, pages = {404-415}, booktitle = {iiswc}, } @article{Collberg02:0, title = {Automatic derivation of compiler machine descriptions}, author = {Christian S. Collberg}, year = {2002}, doi = {10.1145/567097.567100}, url = {http://doi.acm.org/10.1145/567097.567100}, tags = {compiler}, researchr = {https://researchr.org/publication/Collberg02%3A0}, cites = {0}, citedby = {0}, journal = {TOPLAS}, volume = {24}, number = {4}, pages = {369-408}, } @article{CollbergP04, title = {Problem identification using program checking}, author = {Christian S. Collberg and Todd A. Proebsting}, year = {2004}, doi = {10.1016/j.dam.2003.11.005}, url = {http://dx.doi.org/10.1016/j.dam.2003.11.005}, researchr = {https://researchr.org/publication/CollbergP04}, cites = {0}, citedby = {0}, journal = {DAM}, volume = {144}, number = {3}, pages = {270-280}, } @inproceedings{CollbergT99, title = {Software Watermarking: Models and Dynamic Embeddings}, author = {Christian S. Collberg and Clark D. Thomborson}, year = {1999}, doi = {10.1145/292540.292569}, url = {http://doi.acm.org/10.1145/292540.292569}, tags = {embedded software, watermarking}, researchr = {https://researchr.org/publication/CollbergT99}, cites = {0}, citedby = {0}, pages = {311-324}, booktitle = {POPL}, } @inproceedings{CollbergKW04, title = {AlgoVista: an algorithmic search tool in an educational setting}, author = {Christian S. Collberg and Stephen G. Kobourov and Suzanne Westbrook}, year = {2004}, doi = {10.1145/971300.971457}, url = {http://doi.acm.org/10.1145/971300.971457}, tags = {search}, researchr = {https://researchr.org/publication/CollbergKW04}, cites = {0}, citedby = {0}, pages = {462-466}, booktitle = {sigcse}, } @inproceedings{CollbergKCT03, title = {Graph-Based Approaches to Software Watermarking}, author = {Christian S. Collberg and Stephen G. Kobourov and Edward Carter and Clark D. Thomborson}, year = {2003}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2880&spage=156}, tags = {rule-based, watermarking, graph-rewriting, rewriting, systematic-approach}, researchr = {https://researchr.org/publication/CollbergKCT03}, cites = {0}, citedby = {0}, pages = {156-167}, booktitle = {criwg}, } @article{CollbergT02, title = {Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection}, author = {Christian S. Collberg and Clark D. Thomborson}, year = {2002}, url = {http://www.computer.org:80/tse/ts2002/e0735abs.htm}, tags = {watermarking}, researchr = {https://researchr.org/publication/CollbergT02}, cites = {0}, citedby = {0}, journal = {TSE}, volume = {28}, number = {8}, pages = {735-746}, } @inproceedings{CollbergKNPW03, title = {A System for Graph-Based Visualization of the Evolution of Software}, author = {Christian S. Collberg and Stephen G. Kobourov and Jasvir Nagra and Jacob Pitts and Kevin Wampler}, year = {2003}, tags = {rule-based, software evolution, graph-rewriting, rewriting}, researchr = {https://researchr.org/publication/CollbergKNPW03}, cites = {0}, citedby = {0}, pages = {77}, booktitle = {softvis}, } @inproceedings{CollbergTL98, title = {Breaking Abstractions and Unstructuring Data Structures}, author = {Christian S. Collberg and Clark D. Thomborson and Douglas Low}, year = {1998}, url = {http://computer.org/proceedings/iccl/8454/84540028abs.htm}, tags = {data-flow, abstraction}, researchr = {https://researchr.org/publication/CollbergTL98}, cites = {0}, citedby = {0}, pages = {28-38}, booktitle = {iccl}, } @inproceedings{CollbergHBU05, title = {SLINKY: Static Linking Reloaded}, author = {Christian S. Collberg and John H. Hartman and Sridivya Babu and Sharath K. Udupa}, year = {2005}, url = {http://www.usenix.org/events/usenix05/tech/general/collberg.html}, researchr = {https://researchr.org/publication/CollbergHBU05}, cites = {0}, citedby = {0}, pages = {309-322}, booktitle = {usenix}, } @article{MylesC06, title = {Software watermarking via opaque predicates: Implementation, analysis, and attacks}, author = {Ginger Myles and Christian S. Collberg}, year = {2006}, doi = {10.1007/s10660-006-6955-z}, url = {http://dx.doi.org/10.1007/s10660-006-6955-z}, tags = {watermarking, analysis}, researchr = {https://researchr.org/publication/MylesC06}, cites = {0}, citedby = {0}, journal = {ecr}, volume = {6}, number = {2}, pages = {155-171}, } @inproceedings{SnodgrassYC04, title = {Tamper Detection in Audit Logs}, author = {Richard T. Snodgrass and Shilong (Stanley) Yao and Christian S. Collberg}, year = {2004}, url = {http://www.vldb.org/conf/2004/RS13P1.PDF}, researchr = {https://researchr.org/publication/SnodgrassYC04}, cites = {0}, citedby = {0}, pages = {504-515}, booktitle = {VLDB}, } @inproceedings{CollbergCDHKLS04, title = {Dynamic path-based software watermarking}, author = {Christian S. Collberg and Edward Carter and Saumya K. Debray and Andrew Huntwork and John D. Kececioglu and Cullen Linn and Michael Stepp}, year = {2004}, doi = {10.1145/996841.996856}, url = {http://doi.acm.org/10.1145/996841.996856}, tags = {rule-based, watermarking}, researchr = {https://researchr.org/publication/CollbergCDHKLS04}, cites = {0}, citedby = {0}, pages = {107-118}, booktitle = {PLDI}, } @article{CollbergK05, title = {Self-plagiarism in computer science}, author = {Christian S. Collberg and Stephen G. Kobourov}, year = {2005}, doi = {10.1145/1053291.1053293}, url = {http://doi.acm.org/10.1145/1053291.1053293}, tags = {reuse, data-flow, e-science, context-aware, plagiarism, self-plagiarism}, researchr = {https://researchr.org/publication/CollbergK05}, cites = {0}, citedby = {0}, journal = {CACM}, volume = {48}, number = {4}, pages = {88-94}, } @inproceedings{Collberg89, title = {Data Structures, Algorithms, and Software Engineering}, author = {Christian S. Collberg}, year = {1989}, tags = {data-flow, software engineering}, researchr = {https://researchr.org/publication/Collberg89}, cites = {0}, citedby = {0}, pages = {70-79}, booktitle = {csee}, } @inproceedings{KobourovCKSTY03, title = {TetraTetris: A Study of Multi-User Touch-Based Interaction Using DiamondTouch}, author = {Stephen G. Kobourov and Christian S. Collberg and Steven Kobes and Ben Smith and S. Trush and Gary V. Yee}, year = {2003}, tags = {rule-based}, researchr = {https://researchr.org/publication/KobourovCKSTY03}, cites = {0}, citedby = {0}, booktitle = {ACMdis}, } @inproceedings{CollbergTL:POPL:1998, title = {Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs}, author = {Christian S. Collberg and Clark D. Thomborson and Douglas Low}, year = {1998}, doi = {10.1145/268946.268962}, url = {http://doi.acm.org/10.1145/268946.268962}, tags = {model-to-model transformation, rule-based, transformation engineering, Java, program analysis, reverse engineering, obfuscation, points-to analysis, analysis, static analysis, data-flow programming, data-flow, source-to-source, software engineering, model-driven engineering, model transformation, data-flow analysis, design, open-source, transformation, program transformation}, researchr = {https://researchr.org/publication/CollbergTL%3APOPL%3A1998}, cites = {0}, citedby = {0}, pages = {184-196}, booktitle = {POPL}, } @inproceedings{Collberg97, title = {Reverse Interpretation + Mutation Analysis = Automatic Retargeting}, author = {Christian S. Collberg}, year = {1997}, tags = {analysis}, researchr = {https://researchr.org/publication/Collberg97}, cites = {0}, citedby = {0}, pages = {57-70}, booktitle = {PLDI}, } @inproceedings{MylesC03, title = {Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks}, author = {Ginger Myles and Christian S. Collberg}, year = {2003}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2971&spage=274}, tags = {watermarking, analysis}, researchr = {https://researchr.org/publication/MylesC03}, cites = {0}, citedby = {0}, pages = {274-293}, booktitle = {icisc}, } @article{CollbergMH03, title = {Sandmark--A Tool for Software Protection Research}, author = {Christian S. Collberg and Ginger Myles and Andrew Huntwork}, year = {2003}, doi = {10.1109/MSECP.2003.1219058}, url = {http://doi.ieeecomputersociety.org/10.1109/MSECP.2003.1219058}, researchr = {https://researchr.org/publication/CollbergMH03}, cites = {0}, citedby = {0}, journal = {ieeesp}, volume = {1}, number = {4}, pages = {40-49}, } @article{MylesCHN05, title = {The evaluation of two software watermarking algorithms}, author = {Ginger Myles and Christian S. Collberg and Zachary V. Heidepriem and Armand Navabi}, year = {2005}, doi = {10.1002/spe.657}, url = {http://dx.doi.org/10.1002/spe.657}, tags = {watermarking}, researchr = {https://researchr.org/publication/MylesCHN05}, cites = {0}, citedby = {0}, journal = {SPE}, volume = {35}, number = {10}, pages = {923-938}, } @inproceedings{CollbergKMW02, title = {AlambdagoVista: a tool to enhance algorithm design and understanding}, author = {Christian S. Collberg and Stephen G. Kobourov and Jessica Miller and Suzanne Westbrook}, year = {2002}, doi = {10.1145/544414.544496}, url = {http://doi.acm.org/10.1145/544414.544496}, tags = {design}, researchr = {https://researchr.org/publication/CollbergKMW02}, cites = {0}, citedby = {0}, pages = {228}, booktitle = {iticse}, } @proceedings{ih:2006, title = {Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, year = {2007}, tags = {information hiding}, researchr = {https://researchr.org/publication/ih%3A2006}, cites = {0}, citedby = {0}, booktitle = {Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, conference = {ih}, editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil Sallee}, volume = {4437}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-74123-7}, }