systems, particularly for identity management and privacy
protection. Algorithms and applications for
software watermarking and
obfuscation. My inactive/former areas of interest
include software performance engineering
and R&D policy.
Teaching (S2 2015)
Security. Lectures: Tu 10-11 in 303-B11, Wed 3-4 in 303-B07, Thu
10-11 in Eng3 403-408. Tutorial sessions are held during weeks 4, 5,
7, 8, 9 , 10 and 11: Mo 12-1 in 206-213, Mo 1-2 in OCH2 104-G54.
- My office hours during S2 2015 are Friday 3-4pm, in my office
810-845. Urgent queries should be directed to the departmental front
office 303S.384, phone (09) 3737 599 x85857.
Recent and Forthcoming Publications and Lectures
- Pinpointing and Hiding
Surprising Fragments in an Obfuscated Program, by Yuichiro
Kanzaki, Clark Thomborson, Akito Monden, and Christian Collberg,
to appear in Proceedings of
the 5th Program Protection and
Reverse Engineering Workshop, affiliated with
ACSAC 2015, Los Angeles,
CA (USA), 8 December 2015.
Experiment on the Impact of Transparency on the Effectiveness of
Requirements Documents, by Yu-Cheng Tu, Ewan Tempero, and
Clark Thomborson, Empirical
Software Engineering, available online February 2015.
- Benchmarking Obfuscators
of Functionality, arXiv:1501.02885, 8 pp., 13 January 2015.
Presentation of Requirements Documents: Results of an Experiment,
by Yu-Cheng Tu, Ewan Tempero, and Clark
Vol. 432 (First Asia Pacific
Requirements Engineering Symposium, Auckland, 28-29 April 2014),
Springer, pp. 120-134, 2014.
- The Deep Web,
Bitcoins, Silk Road and 21st Century Society, 10-minute interview
Thursday Wire, 95bFM, University
- Protecting Privacy: Who Is
Responsible?, oral presentation to
Zealand Information Security Forum, Auckland, 12 September
- The Dhammic Framework for Understanding
the Cause of System Project Failures from Buddhist Insights, by
Pita Jarupunphol and Clark Thomborson, to appear
in Proc. 12th
IEEE International Conference on Cognitive Informatics and Cognitive
Computing (ICCI*CC 2013, New York City, 16-18 July 2013).
- Securing Personas, oral presentation in the Security track at
Group Enterprise Transformation Conference, Sydney, 15-18 April
2013. This slideshow will also be published on the Open Group website,
in its official record of the conference.
Data Protection: Problem Statement and Requirements for Future Solutions,
A White Paper by Members of the Jericho Forum, a forum of The Open Group,
17 pp., October 2012.
Cloud-Based Watermarking Method for Health Data Security, by
Zhiwei Yu, Clark Thomborson, Chaokun Wang, Jianmin Wang, and Rui Li,
in Proc. International
Conference on High Performance Computing & Simulation (HPCS 2012),
pp. 642-647, 2012. The only recipient of
Graphic Expression for Privacy and Identity Claims, oral
and Privacy Forum for
the Privacy Commissioner of New
Zealand, University of Auckland, 20 June 2012.
- The Art
and Science of Obfuscation,
Systems, Technology and Management (ICISTM 2012, Grenoble,
28-30 March 2012), Springer CCIS 285:9, 445-450, 2012.
Applications and Security in MapReduce: Opportunities and
Challenges, by Zhiwei Yu, Chaokun Wang, Clark Thomborson,
Jianmin Wang, Shiguo Lian, and Athanasios Vasilikos, Concurrency
and Computation: Practice and Experience 24:17, 2083-2101, 2012.
- A Novel
Watermarking Method for Software Protection in the Cloud, by
Zhiwei Yu, Chaokun Wang, Clark Thomborson, Jianmin Wang, Shiguo
Lian, and Athanasios Vasilikos,
Practice and Experience 42:4 409-430, Wiley, 2012.
Framework for System Security, by Clark Thomborson,
in Handbook of
Information and Communication Security, eds. P. Stavroulakis
and M. Stamp, Springer, 6 March
2010. Word cloud,
produced by Wordle.
list of publications.
Google Scholar listing.
Recent Professional Service
- Deputy Head (Academic) for Computer Science, March 2013 to April 2014.
- Primary Representative to
the Jericho Forum
for the University of Auckland, 2005-2013.
- University of Auckland International Committee, from January 2013
to December 2013.
- Recent programme committees:
IEEE Globecom 2015,
6-10 December 2015, San Diego, CA, USA;
Intelligence Security Informatics
(IEEE ISI 2015), Baltimore, MD, USA;
First International Workshop on
Software Protection (SPRO 2015), 19 May 2015, affiliated with ICSE
2015, Florence, Italy;
Information Security Conference (ACSW-AISC 2015), 27-30 January
Fourth Program Protection and Reverse
Engineering Workshop (PPREW-4), 9 December 2014, affiliated with
ACSAC 2014, New Orleans, LA, USA;
IEEE ICC 2014 -
Communication and Information Systems Security Symposium, 10-14
June 2014, Sydney;
- 1975 B.S. (honors) Chemistry, Stanford University
- 1975 M.S., Computer Science / Computer Engineering, Stanford University
- 1980 Ph.D., Computer Science, Carnegie-Mellon University
- 1979-86 Assistant Professor of EECS at UC Berkeley
- 1983 married Barbara Borske
- 1983 Barbara and I transformed our surnames by "gene-swapping":
Thompson+Borske = Thomborson (but not Thomborsonske, nor Borthomp).
- 1986-94 Professor of CS at U Minnesota-Duluth
- 1992-3 Visiting Professor of EECS at MIT
- 1995 Principal Programmer, LaserMaster Corp of Minnesota
- 1996 emigrated to New Zealand
PKCS certificate (for verifying signed
FDF certificate (for verifying signed PDF documents).
Department of Computer Science
University of Auckland
Private Bag 92019, Auckland 1142
+(64 9) 3737-599 x85753 (office)
+(64 9) 817-1234 (home voice)
+(64 21) 2466-034 (cellphone)