Search For:

Displaying 1-13 out of 13 total
Toward Digital Asset Protection
Found in: IEEE Intelligent Systems
By Christian Collberg,Jack Davidson,Roberto Giacobazzi,Yuan Xiang Gu,Amir Herzberg,Fei-Yue Wang
Issue Date:November 2011
pp. 8-13
The goal of software protection (SP) research is to make software safe from malicious attacks by preventing adversaries from tampering, reverse engineering, and illegally redistributing software. The Digital Asset Protection Association (DAPA) was launched...
 
Breaking Abstractions and Unstructuring Data Structures
Found in: Computer Languages, International Conference on
By Christian Collberg, Clark Thomborson, Douglas Low
Issue Date:May 1998
pp. 28
To ensure platform independence, mobile programs are distributed in forms that are isomorphic to the original source code. Such codes are easy to decompile, and hence they increase the risk of malicious reverse engineering attacks.Code obfuscation is one o...
 
Guest Editors' Introduction: Software Protection
Found in: IEEE Software
By Paolo Falcarin, Christian Collberg, Mikhail Atallah, Mariusz Jakubowski
Issue Date:March 2011
pp. 24-27
Software protection is increasingly becoming an important requirement for industrial software development, especially when building systems for military defense, national infrastructure, and medical informatics. Every software vendor should be aware of the...
 
Barrier Slicing for Remote Software Trusting
Found in: Source Code Analysis and Manipulation, IEEE International Workshop on
By Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian Collberg, Paolo Tonella
Issue Date:October 2007
pp. 27-36
Remote trusting aims at verifying the
 
Sandmark--A Tool for Software Protection Research
Found in: IEEE Security and Privacy
By Christian Collberg, Ginger Myles, Andrew Huntwork
Issue Date:July 2003
pp. 40-49
<p>Sandmark is a tool that measures the effectiveness of software-based methods for protecting software from piracy, tampering, and reverse engineering. The Sandmark team's goal is to develop techniques that will let users determine empirically which...
 
Distributed application tamper detection via continuous software updates
Found in: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12)
By Christian Collberg, Jasvir Nagra, Jonathan Myers, Sam Martin
Issue Date:December 2012
pp. 319-328
We present a new general technique for protecting clients in distributed systems against Remote Man-at-the-end (R-MATE) attacks. Such attacks occur in settings where an adversary has physical access to an untrusted client device and can obtain an advantage...
     
A semi-dynamic multiple watermarking schemefor java applications
Found in: Proceedings of the nineth ACM workshop on Digital rights management (DRM '09)
By Changjiang Zhang, Chaokun Wang, Christian Collberg, Clark Thomborson, Jianmin Wang
Issue Date:November 2009
pp. 59-72
Software protection and security has been a more and more important issue. In order to prevent software from unauthorized use and modification, a great many techniques have been proposed and developed. In this paper, we address this issue through a prevent...
     
Self-plagiarism in computer science
Found in: Communications of the ACM
By Christian Collberg, Stephen Kobourov
Issue Date:April 2005
pp. 88-94
We are all too aware of the ravages of misconduct in the academic community. Students submit assignments inherited from their friends, online papermills provide term papers on popular topics, and occasionally researchers are found falsifying data or publis...
     
K-gram based software birthmarks
Found in: Proceedings of the 2005 ACM symposium on Applied computing (SAC '05)
By Christian Collberg, Ginger Myles
Issue Date:March 2005
pp. 314-318
Software birthmarking relies on unique characteristics that are inherent to a program to identify the program in the event of suspected theft. In this paper we present and empirically evaluate a novel birthmarking technique which uniquely identifies a prog...
     
A system for graph-based visualization of the evolution of software
Found in: Proceedings of the 2003 ACM symposium on Software visualization (SoftVis '03)
By Christian Collberg, Jacob Pitts, Jasvir Nagra, Kevin Wampler, Stephen Kobourov
Issue Date:June 2003
pp. 77-ff
We describe GEVOL, a system that visualizes the evolution of software using a novel graph drawing technique for visualization of large graphs with a temporal component. GEVOL extracts information about a Java program stored within a CVS version control sys...
     
AλgoVista: a tool to enhance algorithm design and understanding
Found in: Proceedings of the 7th annual conference on Innovation and technology in computer science education (ITiCSE'02)
By Christian Collberg, Jessica Miller, Stephen G. Kobourov, Suzanne Westbrook
Issue Date:June 2002
pp. 125-180
AλgoVista is a web-based search engine that assists programmers to and algorithms and implementations that solve specific problems.The search engine is not keyword based but rather requires users to provide (input = ?output)samples that describe the b...
     
Software watermarking: models and dynamic embeddings
Found in: Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages (POPL '99)
By Christian Collberg, Clark Thomborson
Issue Date:January 1999
pp. 311-324
We describe a framework for flow analysis in higher-order languages. It is both a synthesis and extension of earlier work in this area, most notably [20, 22]The framework makes explicit use of flow graphs for modeling control and data flow properties of un...
     
Manufacturing cheap, resilient, and stealthy opaque constructs
Found in: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages (POPL '98)
By Christian Collberg, Clark Thomborson, Douglas Low
Issue Date:January 1998
pp. 184-196
We describe a framework for flow analysis in higher-order languages. It is both a synthesis and extension of earlier work in this area, most notably [20, 22]The framework makes explicit use of flow graphs for modeling control and data flow properties of un...
     
 1