Publications

  1. Christian Collberg, Sam Martin, Jonathan Myers, Jasvir Nagra, Spatio-Temporal-Semantic Software Diversity for Distributed Application Protection, Under review, 2012.
  2. Christian Collberg, Defeating Real Bad Guys in a Virtual World, Arizona Star Science Supplement, December 11, 2011. pdf
  3. Paolo Falcarin, Christian Collberg, Mikhail J. Atallah, Mariusz H. Jakubowski, Guest Editors' Introduction: Software Protection, IEEE Software, Volume 28, Number 2, pp. 24--27, 2011. pdf
  4. Christian Collberg, The Case for Dynamic Digital Asset Protection Techniques, IRDETO Whitepaper, pdf, June 2011.
  5. Christian Collberg, Jack Davidson, Roberto Giacobazzi, Yuan Xiang Gu, Amir Herzberg, Fei-Yue Wang, Toward Digital Asset Protection, IEEE Intelligent Systems, Volume 26, Number 6, pp. 8--13, 2011. pdf
  6. Christian Collberg, Clark Thomborson, Software Watermarking Techniques, US Patent Application, 2011/0214188, Assignee: University of Auckland, Filed November 15, 2010. pdf
  7. Christian Collberg, Jasvir Nagra, Surreptitious Software --- Obfuscation, Watermarking, and Tamperproofing for Software Protection, Addison-Wesley Software Security Series, Editor: Gary McGraw, 792 pages, ISBN: 0-321-54925-2, August 2009. buy
  8. Christian Collberg, Andrew Huntwork, Edward Carter, Gregg Townsend, Michael Stepp, More on graph theoretic software watermarks: Implementation, analysis, and attacks, Information and Software Technology, Volume 51, Number 1, January 2009. pdf
  9. Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian Collberg, Paolo Tonella, Trading-off Security and Performance in Barrier Slicing for Remote Software Entrusting, Automated Software Engineering, Volume 16, Number 2, pp. 235--261, 2009. pdf
  10. Christian Collberg, Jasvir Nagra, Sub-Reptício Software - Ofuscamento, Aplicaçăo de Marcas D´Água e Resistęncia a Alteraçőes para Proteçăo de Software, 832 pages, ISBN: 8573939117, 2010, Brazilian Portuguese Translation of Surreptitious Software. buy
  11. Christian Collberg, Jasvir Nagra, Simplified Chinese Translation of Surreptitious Software.
  12. Changjiang Zhang, Jianmin Wang, Clark D. Thomborson, Chaokun Wang, Christian Collberg, A Semi-dynamic Multiple Watermarking Scheme for Java Applications, Digital Rights Management Workshop, pp. 59--72, 2009. pdf
  13. M. Ceccato, M. Dalla Preda, J. Nagra, Christian Collberg, P. Tonella, Barrier Slicing for Remote Software Trusting, 7th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'07), pp, 27-36, IEEE Computer Society Press. October 2007. pdf
  14. Christian Collberg, Michael Stepp, Ginger Myles, An Empirical Study of Java Bytecode Programs, Software --- Practice & Experience, Volume 37, Number 6, pp: 581 - 641, May 2007. pdf
  15. Christian Collberg, Clark Thomborson, Gregg M. Townsend, Dynamic Graph-Based Software Fingerprinting, ACM Transactions of Programming Languages and Systems, Volume 29, Number 6, October 2007. pdf
  16. Michael Stepp, Christian Collberg, Browser Toolbars, Book chapter, in, Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, Editors Markus Jakobsson and Steve Myers, Wiley, 2007, ISBN: 0-471-78245-9. buy
  17. Christian Collberg, Jasvir Nagra, Fei-Yue Wang, Surreptitious Software: Models from Biology and History, Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (MMM-ACNS 2007), Communications in Computer and Information Science, Volume 1, Computer Network Security, Springer, 2007, pp. 1-21. pdf
  18. Ginger Myles, Christian Collberg, Software Watermarking via Opaque Predicates: Implementation, Analysis, and Attacks, Electronic Commerce Research Journal, Volume 6, Number 2, pp. 155-171, 2006. pdf
  19. Jan Camenisch, Christian Collberg, Neil F. Johnson, Phil Sallee (Editors), 8th International Workshop of Information Hiding (IH 2006), Springer LNCS 4437, ISBN 978-3-540-74123-7, July 10-12, 2006. buy
  20. Ginger Myles, Christian Collberg, k-gram Based Software Birthmarks, Proceedings of the 2005 ACM Symposium on Applied Computing, Computer Security Track, pp. 314-318, 2005. pdf
  21. Christian Collberg, Stephen Kobourov, Self-Plagiarism in Computer Science, Communications of the ACM, April 2005. pdf
  22. Christian Collberg, Tapas Sahoo, Software Watermarking in the Frequency Domain: Implementation, Analysis, and Attacks, Journal of Computer Security, Volume 13, Number 5, 721--755, 2005. pdf
  23. Ginger Myles, Christian Collberg, Zachary Heidepriem, Armand Navabi, The evaluation of two software watermarking algorithms, Software - Practice and Experience Volume 35, Number 10, pp 923-938, 2005. pdf
  24. Christian Collberg, John H. Hartman, Sridivya Babu, Sharath K. Udupa, Slinky: Static Linking Reloaded, Usenix, 2005. pdf
  25. C. M. Linn, M. Rajagopalan, S. Baker, Christian Collberg, S. K. Debray, J. H. Hartman, Protecting Against Unexpected System Calls, Usenix Security, 2005. pdf
  26. Christian Collberg, Edward Carter, Saumya Debray, Andrew Huntwork, John Kececioglu, Cullen Linn, Michael Stepp, Dynamic Path-Based Software Watermarking, ACM Programming Languages Design and Implementation (PLDI), 2004. pdf
  27. Christian Collberg, Todd Proebsting, Problem identification using program checking, Discrete Applied Mathematics, Volume 144, Number 3,pp. 270--280, 2004. pdf
  28. Richard T. Snodgrass, Shilong Yao, Christian Collberg, Tamper Detection in Audit Logs, International Conference on Very Large Data Bases (VLDB), 2004. pdf
  29. Christian Collberg, Andrew Huntwork, Edward Carter, Gregg Townsend, Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks, 6thInformation Hiding Workshop, 2004. pdf
  30. Ginger Myles, Christian Collberg, Software Watermarking via Opaque Predicates: Implementation, Analysis, and Attack, The Seventh International Conference on Electronic Commerce Research (ICECR-7), June 2004. pdf
  31. Kelly Heffner, Christian Collberg, The Obfuscation Executive, 7th Information Security Conference (ISC'04), September 2004. pdf
  32. Ginger Myles, Christian Collberg, Detecting Software Theft via Whole Program Path Birthmarks, 7th Information Security Conference (ISC'04), September 2004. pdf
  33. Christian Collberg, Stephen Kobourov, Suzanne Westbrook, AlgoVista: an algorithmic search tool in an educational setting, Technical Symposium on Computer Science Education (SIGCSE), pp. 462-466, March 2004. acm
  34. Christian Collberg, Stephen Kobourov, Jasvir Nagra, Jacob Pitts, Kevin Wampler, A System for Graph-Based Visualization of the Evolution of Software, ACM symposium on Software visualization (Softvis), 2003.
  35. pdf
  36. Christian Collberg, Ginger Myles, Andrew Huntwork, Sandmark--A Tool for Software Protection Research, IEEE Security & Privacy, Volume 1, Number 4, pp. 40--49, 2003. pdf
  37. Christian Collberg, Stephen Kobourov, Steven Kobes, Ben Smith, Stephen Trush, Gary Yee, TetraTetris: an Application of Multi-User Touch-Based Human-Computer Interaction, 9th IFIP International Conference on Human-Computer Interaction (INTERACT), 2003. pdf
  38. Christian Collberg, Edward Carter, Stephen Kobourov, Clark Thomborson, Error-Correcting Graphs for Software Watermarking, 29th Workshop on Graph Theoretic Concepts in Computer Science (WG'2003), June 2003. pdf
  39. Christian Collberg, Stephen Kobourov, Joshua Louie, Thomas Slattery, SPLAT: A System for Self-Plagiarism Detection, IADIS International Conference WWW/Internet (ICWI 2003), pp. 508-514, November 2003. pdf
  40. Ginger Myles, Christian Collberg, Software Watermarking Through Register Allocation: Implementation Analysis, and Attacks, 6th Annual International Conference on Information Security and Cryptology (ICISC), November 2003. springer
  41. Christian Collberg, Clark Thomborson, Douglas Low, Obfuscation techniques for enhancing software security, United States Patent 6,668,325, Assignee: InterTrust Technologies (Santa Clara, CA), Filed June 9, 1998, Issued December 23, 2003. pdf
  42. Christian Collberg, A Fuzzy Visual Query Language for a Domain-Specific Web Search Engine, Diagrammatic Representation and Inference, Second International Conference (DIAGRAMS'02), 18-20 April 2002, LNAI 2317. pdf
  43. Christian Collberg, Automatic Derivation of Compiler Machine Descriptions, ACM Transactions on Programming Languages and Systems, Volume 24, Number 4, July 2002, pp. 369--408. pdf
  44. Christian Collberg, Clark Thomborson, Watermarking, Tamper-Proofing, and Obfuscation -- Tools for Software Protection, IEEE Transactions on Software Engineering, Volume 28, Number 8, pp. 735--746, August 2002, This paper was among the most cited journal articles in software engineering from 2002 based on a citation study conducted by Prof. Claes Wohlin, pdf
  45. Jasvir Nagra, Clark Thomborson, Christian Collberg, A Functional Taxonomy for Software Watermarking, Twenty-Fifth Australasian Computer Science Conference (ACSC'2002), January 2002. pdf
  46. Christian Collberg, Todd A. Proebsting, Problem Classification using Program Checking, Fun with Algorithms (FUN '01), May 29--31, 2001. pdf
  47. Christian Collberg, Sean Davey, Todd Proebsting, Language-Agnostic Program Rendering for Presentation, Debugging and Visualization, IEEE Symposium on Visual Languages (VL'2000), September 2000. pdf
  48. Christian Collberg, Clark Thomborson, Software Watermarking --- Models and Dynamic Embeddings, ACM Principles of Programming Languages (POPL'99), January 1999. pdf
  49. Christian Collberg, Clark Thomborson, and Douglas Low, Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs, ACM Principles of Programming Languages (POPL'98), January 1998. pdf (scanned), pdf (clean)
  50. Christian Collberg, Clark Thomborson, Douglas Low, Breaking Abstractions and Unstructuring Data Structures, IEEE International Conference on Computer Languages (ICCL'98), May 1998. pdf
  51. Christian Collberg, Automatic Derivation of Machine Descriptions, Proceedings of the Twentieth Australasian Computer Science Conference, February 1997. pdf
  52. Christian Collberg, Reverse Interpretation + Mutation Analysis = Automatic Re" targeting, ACM SIGPLAN Conference on Programming Language Design and Implementation, (PLDI'97), June 1997. pdf
  53. Christian Collberg, Distributed High-Level Module Binding for Flexible Encapsulation and Fast Inter-Modular Optimization, International Conference on Programming Languages and Systems Architectures, LNCS 782, March 1994. pdf
  54. Christian Collberg, Flexible Encapsulation, Ph.D. Thesis, Lund University, December 1992. pdf(A4), pdf(letter), bibtex.
  55. Christian Collberg, Data Structures, Algorithms, and Software Engineering, 3rd SEI Conference on Software Engineering Education, LNCS 376, July 1989. pdf
  56. Christian Collberg, Magnus Krampell, Design and Implementation of Modular Languages Supporting Information Hiding, 6th International Phoenix Conference on Computers and Communications, February 1987.
  57. Christian Collberg, Magnus Krampell, A Property-Based Method for Selecting Among Multiple Implementations of Modules, 1st European Software Engineering Conference, LNCS 289, September 1987. acm