Map Home
Type / to search with text or keywords
/
keyboard shortcut: Type "/" on your keyboard for a quick search
Search button
Loading...
Loading...
Scroll left
Grants
Citations
H-Index
Patents
News
Books
Scroll right
Collapse sidebar
Data issues & feedback
Adjust height of sidebar
KMap
People
Adjust height of sidebar
KMap
Profile
Christian Collberg
Professor, Computer Science | Member of the Graduate Faculty
Computer Science
Full Page
Overview
Research
More
Collaboration
(6)
Sudha Ram
Mutual work: 1 Grant﹒3 Proposals
Collaboration Details
Loukas Lazos
Mutual work: 6 Proposals﹒3 Grants
Collaboration Details
Saumya Debray
Mutual work: 12 Proposals﹒3 Publications﹒3 Grants
Collaboration Details
David Lowenthal
Mutual work: 1 Proposal
Collaboration Details
John Kececioglu
Mutual work: 1 Proposal
Collaboration Details
Page 1 of 2
Previous page
Next page
Grants
(9)
Sign in to view all grants
Page 1 of 2
Previous page
Next page
Publications
(50)
Recent
Control-Flow Deobfuscation using Trace-Informed Compositional Program Synthesis
2024
obfuscation,
deobfuscation
Code Obfuscation: Why is This Still a Thing? Keynote Address)
2018
cybersecurity,
software engineering,
computer science,
ethical hacking,
information technology
Probabilistic Obfuscation through Covert Channels
2017
cybersecurity,
information security,
cryptography,
network security,
data privacy
Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning
2017
cybersecurity,
machine learning,
code obfuscation,
symbolic execution,
predictive modeling
A Tool for Teaching Reverse Engineering
2016
computer science,
education,
software engineering,
reverse engineering,
technology
Repeatability in computer systems research
2016
repeatability,
computer systems,
research,
computing,
experimental design
Code obfuscation against symbolic execution attacks
2016
cybersecurity,
software engineering,
cryptography,
computer science,
information security
Engineering Code Obfuscation Invited Talk)
2016
cybersecurity,
software engineering,
computer science,
information technology,
data security
A Possible Solution for Privacy Preserving Cloud Data Storage
2015
privacy preservation,
cloud data storage,
data security,
cybersecurity,
data encryption
Pinpointing and Hiding Surprising Fragments in an Obfuscated Program
2015
program obfuscation,
code analysis,
security,
obfuscation techniques,
software protection