Map Home
Type / to search with text or keywords
/
keyboard shortcut: Type "/" on your keyboard for a quick search
Search button
Loading...
Loading...
Scroll left
Grants
Citations
H-Index
Patents
News
Books
Scroll right
Collapse sidebar
Data issues & feedback
Adjust height of sidebar
KMap
People
Adjust height of sidebar
KMap
Profile
Christian Collberg
Professor, Computer Science | Member of the Graduate Faculty
Computer Science
Full Page
Overview
Research
More
Collaboration
(6)
Sudha Ram
Mutual work: 1 Grant﹒3 Proposals
Collaboration Details
Loukas Lazos
Mutual work: 6 Proposals﹒3 Grants
Collaboration Details
Saumya Debray
Mutual work: 12 Proposals﹒3 Publications﹒3 Grants
Collaboration Details
David Lowenthal
Mutual work: 1 Proposal
Collaboration Details
John Kececioglu
Mutual work: 1 Proposal
Collaboration Details
Page 1 of 2
Previous page
Next page
Grants
(9)
Sign in to view all grants
Page 1 of 2
Previous page
Next page
Publications
(51)
Recent
Control-Flow Deobfuscation using Trace-Informed Compositional Program Synthesis
2024
code obfuscation,
program synthesis
Tools and Models for Software Reverse Engineering Research
2024
tool development,
modeling,
software analysis,
computer science
Code Obfuscation: Why is This Still a Thing? Keynote Address)
2018
cybersecurity,
software engineering,
computer science,
ethical hacking,
information technology
Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning
2017
cybersecurity,
machine learning,
code obfuscation,
symbolic execution,
predictive modeling
Probabilistic Obfuscation through Covert Channels
2017
cybersecurity,
information security,
cryptography,
network security,
data privacy
A Tool for Teaching Reverse Engineering
2016
computer science,
education,
software engineering,
reverse engineering,
technology
Code obfuscation against symbolic execution attacks
2016
cybersecurity,
software engineering,
cryptography,
computer science,
information security
Repeatability in computer systems research
2016
repeatability,
computer systems,
research,
computing,
experimental design
Engineering Code Obfuscation Invited Talk)
2016
cybersecurity,
software engineering,
computer science,
information technology,
data security
Pinpointing and Hiding Surprising Fragments in an Obfuscated Program
2015
program obfuscation,
code analysis,
security,
obfuscation techniques,
software protection