Christian S Collberg

Calculated based on number of publications stored in Pure and citations from Scopus
1987 …2018

Research activity per year

Fingerprint

Dive into the research topics where Christian S Collberg is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles
  • Probabilistic Obfuscation Through Covert Channels

    Stephens, J., Yadegari, B., Collberg, C., Debray, S. & Scheidegger, C., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p. (Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning

    Banescu, S., Collberg, C. & Pretschner, A., 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 661-678 18 p. (Proceedings of the 26th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    45 Scopus citations
  • A tool for teaching reverse engineering

    Taylor, C. & Collberg, C., 2016.

    Research output: Contribution to conferencePaperpeer-review

    15 Scopus citations
  • Code obfuscation against symbolic execution attacks

    Banescu, S., Collberg, C., Ganesh, V., Newsham, Z. & Pretschner, A., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, p. 189-200 12 p. (ACM International Conference Proceeding Series; vol. 5-9-December-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    118 Scopus citations
  • Engineering code obfuscation

    Collberg, C., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J.-S. (eds.). Springer-Verlag, p. XVIII-XIX (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations