Map Home
Type / to search with text or keywords
/
keyboard shortcut: Type "/" on your keyboard for a quick search
Search button
Sign in
Sign in
Scroll left
Grants
Citations
H-Index
Patents
News
Books
Scroll right
Collapse sidebar
Data issues & feedback
Adjust height of sidebar
KMap
Profile
Christian Collberg
Professor, Computer Science | Member of the Graduate Faculty
Computer Science
Full Page
Overview
Research
More
Collaboration
(6)
Sudha Ram
Mutual work: 1 Grant﹒3 Proposals
Collaboration Details
Loukas Lazos
Mutual work: 3 Grants﹒6 Proposals
Collaboration Details
Saumya Debray
Mutual work: 12 Proposals﹒3 Publications﹒3 Grants
Collaboration Details
David Lowenthal
Mutual work: 1 Proposal
Collaboration Details
John Kececioglu
Mutual work: 1 Proposal
Collaboration Details
Page 1 of 2
Previous page
Next page
Grants
(9)
Sign in to view all grants
Page 1 of 2
Previous page
Next page
Publications
(51)
Chart
Bar chart with 21 bars.
The chart has 1 X axis displaying Year.
The chart has 1 Y axis displaying values. Data ranges from 1 to 7.
Created with Highcharts 11.4.8
Year
1987
1997
1998
1999
2000
2002
2003
2004
2005
2006
2007
2009
2011
2012
2013
2014
2015
2016
2017
2018
2024
0
2
4
6
8
End of interactive chart.
Recent
Tools and Models for Software Reverse Engineering Research
2024
tool development,
modeling,
software analysis,
computer science
Control-Flow Deobfuscation using Trace-Informed Compositional Program Synthesis
2024
code obfuscation,
program synthesis
Code Obfuscation: Why is This Still a Thing? Keynote Address)
2018
cybersecurity,
software engineering,
computer science,
ethical hacking,
information technology
Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning
2017
cybersecurity,
machine learning,
code obfuscation,
symbolic execution,
predictive modeling
Probabilistic Obfuscation through Covert Channels
2017
cybersecurity,
information security,
cryptography,
network security,
data privacy
Engineering Code Obfuscation Invited Talk)
2016
cybersecurity,
software engineering,
computer science,
information technology,
data security
Repeatability in computer systems research
2016
repeatability,
computer systems,
research,
computing,
experimental design
A Tool for Teaching Reverse Engineering
2016
computer science,
education,
software engineering,
reverse engineering,
technology
Code obfuscation against symbolic execution attacks
2016
cybersecurity,
software engineering,
cryptography,
computer science,
information security
Pinpointing and Hiding Surprising Fragments in an Obfuscated Program
2015
program obfuscation,
code analysis,
security,
obfuscation techniques,
software protection
Christian Collberg | KMap Profile - Institutional Knowledge Map (KMap)