Map Home
Type / to search with text or keywords
/
keyboard shortcut: Type "/" on your keyboard for a quick search
Search button
Loading...
Loading...
Scroll left
Grants
Citations
H-Index
Patents
News
Books
Scroll right
Collapse sidebar
Data issues & feedback
Adjust height of sidebar
KMap
People
Adjust height of sidebar
KMap
Profile
Christian Collberg
Professor, Computer Science | Member of the Graduate Faculty
Computer Science
Overview
Research
More
Collaboration
(6)
Sudha Ram
Mutual work: 3 Proposals﹒1 Grant
Collaboration Details
Loukas Lazos
Mutual work: 6 Proposals﹒3 Grants
Collaboration Details
Saumya Debray
Mutual work: 3 Grants﹒12 Proposals﹒3 Publications
Collaboration Details
David Lowenthal
Mutual work: 1 Proposal
Collaboration Details
John Kececioglu
Mutual work: 1 Proposal
Collaboration Details
Page 1 of 2
Previous page
Next page
Grants
(9)
SaTC: TTP: Medium: The Tigress Endpoint Protection Tool
Active
·
2021
·
$950.2K
·
External
Principal Investigator (PI)
cybersecurity,
endpoint protection,
network security,
malware detection,
threat intelligence
SaTC:EDU: LIGERLabs: Educational Modules for (Anti-) Reverse Engineering
Active
·
2020
·
$400K
·
External
Principal Investigator (PI)
cybersecurity,
education,
reverse engineering,
computer science,
software development
TWC: Small: Understanding Anti-Analysis Defenses in Malicious Code
2015
·
$265.9K / $531.9K
·
External
Co-Investigator (COI)
cybersecurity,
malware,
computer security,
information technology,
data analysis
A Longitudinal Study of Sharing of Research Artifacts in Computer Science
2015
·
$178.8K / $357.6K
·
External
Principal Investigator (PI)
data sharing,
computer science,
research artifacts,
research impact
TWC TTP: Small: Mitigating Insider Attacks in Provenance Systems
2013
·
$168.7K / $496.1K
·
External
Principal Investigator (PI)
cybersecurity,
provenance systems,
insider attacks,
data security,
risk management
Page 1 of 2
Previous page
Next page
Publications
(51)
Recent
Control-Flow Deobfuscation using Trace-Informed Compositional Program Synthesis
2024
code obfuscation,
program synthesis
Tools and Models for Software Reverse Engineering Research
2024
tool development,
modeling,
software analysis,
computer science
Code Obfuscation: Why is This Still a Thing? Keynote Address)
2018
cybersecurity,
software engineering,
computer science,
ethical hacking,
information technology
Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning
2017
cybersecurity,
machine learning,
code obfuscation,
symbolic execution,
predictive modeling
Probabilistic Obfuscation through Covert Channels
2017
cybersecurity,
information security,
cryptography,
network security,
data privacy
A Tool for Teaching Reverse Engineering
2016
computer science,
education,
software engineering,
reverse engineering,
technology
Code obfuscation against symbolic execution attacks
2016
cybersecurity,
software engineering,
cryptography,
computer science,
information security
Repeatability in computer systems research
2016
repeatability,
computer systems,
research,
computing,
experimental design
Engineering Code Obfuscation Invited Talk)
2016
cybersecurity,
software engineering,
computer science,
information technology,
data security
Pinpointing and Hiding Surprising Fragments in an Obfuscated Program
2015
program obfuscation,
code analysis,
security,
obfuscation techniques,
software protection