default search action
Arun Lakhotia
Person information
- affiliation: University of Louisiana at Lafayette, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i4]Seshagiri Prabhu Narasimha, Arun Lakhotia:
Reverse Engineering Structure and Semantics of Input of a Binary Executable. CoRR abs/2405.14052 (2024) - 2022
- [c45]Seshagiri Prabhu Narasimha, Arun Lakhotia:
Recovering Structure of Input of a Binary Program. CODASPY 2022: 125-136 - 2020
- [j27]Arun Lakhotia, Leigh Metcalf:
Digital Threats: Research and Practice Inaugural Issue Editorial. DTRAP 1(1): 1:1-1:3 (2020) - [c44]Paul Black, Iqbal Gondal, Peter Vamplew, Arun Lakhotia:
Identifying Cross-Version Function Similarity Using Contextual Features. TrustCom 2020: 810-818
2010 – 2019
- 2019
- [c43]Paul Black, Iqbal Gondal, Peter Vamplew, Arun Lakhotia:
Evolved Similarity Techniques in Malware Analysis. TrustCom/BigDataSE 2019: 404-410 - 2018
- [c42]Anthony Arrott, Arun Lakhotia, Ferenc Leitold, Charles LeDoux:
Cluster analysis for deobfuscation of malware variants during ransomware attacks. CyberSA 2018: 1-9 - [c41]Arun Lakhotia, Vivek Notani, Charles LeDoux:
Malware Economics and its Implication to Anti-Malware Situational Awareness. CyberSA 2018: 1-8 - 2017
- [c40]Arun Lakhotia, Paul Black:
Mining malware secrets. MALWARE 2017: 11-18 - [i3]Avi Pfeffer, Brian E. Ruttenberg, Lee Kellogg, Michael Howard, Catherine Call, Alison O'Connor, Glenn Takata, Scott Neal Reilly, Terry Patten, Jason Taylor, Robert Hall, Arun Lakhotia, Craig Miles, Daniel Scofield, Jared Frank:
Artificial Intelligence Based Malware Analysis. CoRR abs/1704.08716 (2017) - [i2]Sarah Zennou, Saumya K. Debray, Thomas Dullien, Arun Lakhotia:
Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281). Dagstuhl Reports 7(7): 44-53 (2017) - 2015
- [c39]Mila Dalla Preda, Roberto Giacobazzi, Arun Lakhotia, Isabella Mastroeni:
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables. POPL 2015: 329-341 - [p1]Charles LeDoux, Arun Lakhotia:
Malware and Machine Learning. Intelligent Methods for Cyber Warfare 2015: 1-42 - 2014
- [c38]Brian E. Ruttenberg, Craig Miles, Lee Kellogg, Vivek Notani, Michael Howard, Charles LeDoux, Arun Lakhotia, Avi Pfeffer:
Identifying Shared Software Components to Support Malware Forensics. DIMVA 2014: 21-40 - [c37]Luke Deshotels, Vivek Notani, Arun Lakhotia:
DroidLegacy: Automated Familial Classification of Android Malware. PPREW@POPL 2014: 3:1-3:12 - 2013
- [j26]Arun Lakhotia, Andrew Walenstein, Craig Miles, Anshuman Singh:
VILO: a rapid learning nearest-neighbor classifier for malware triage. J. Comput. Virol. Hacking Tech. 9(3): 109-123 (2013) - [j25]Radhouane Chouchane, Natalia Stakhanova, Andrew Walenstein, Arun Lakhotia:
Detecting machine-morphed malware variants via engine attribution. J. Comput. Virol. Hacking Tech. 9(3): 137-157 (2013) - [c36]Charles LeDoux, Arun Lakhotia, Craig Miles, Vivek Notani, Avi Pfeffer:
FuncTracker: Discovering Shared Code to Aid Malware Forensics. LEET 2013 - [c35]Jacob Ouellette, Avi Pfeffer, Arun Lakhotia:
Countering malware evolution using cloud-based learning. MALWARE 2013: 85-94 - [c34]Arun Lakhotia, Mila Dalla Preda, Roberto Giacobazzi:
Fast location of similar code fragments using semantic 'juice'. PPREW@POPL 2013: 5:1-5:6 - 2012
- [j24]Craig Miles, Arun Lakhotia, Andrew Walenstein:
In situ reuse of logically extracted functional components. J. Comput. Virol. 8(3): 73-84 (2012) - [c33]Anshuman Singh, Andrew Walenstein, Arun Lakhotia:
Tracking concept drift in malware families. AISec 2012: 81-92 - [c32]Mila Dalla Preda, Wu Feng, Roberto Giacobazzi, Richard Greechie, Arun Lakhotia:
Twisting Additivity in Program Obfuscation. ICISTM 2012: 336-347 - [c31]Charles LeDoux, Andrew Walenstein, Arun Lakhotia:
Improved Malware Classification through Sensor Fusion Using Disjoint Union. ICISTM 2012: 360-371 - [c30]Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia:
Deployable Classifiers for Malware Detection. ICISTM 2012: 384-395 - [c29]Andrew Walenstein, Arun Lakhotia:
A transformation-based model of malware derivation. MALWARE 2012: 17-25 - [c28]Avi Pfeffer, Catherine Call, John Chamberlain, Lee Kellogg, Jacob Ouellette, Terry Patten, Greg Zacharias, Arun Lakhotia, Suresh Golconda, John Bay, Robert Hall, Daniel Scofield:
Malware Analysis and attribution using Genetic Information. MALWARE 2012: 39-45 - [c27]Andrew Walenstein, Luke Deshotels, Arun Lakhotia:
Program Structure-Based Feature Selection for Android Malware Analysis. MobiSec 2012: 51-52 - 2011
- [j23]Kemal Efe, Alp V. Asutay, Arun Lakhotia:
Exploring web neighbours in exploratory search. Int. J. Web Inf. Syst. 7(2): 152-182 (2011) - [c26]Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia:
On deployable adversarial classification models. AISec 2011: 113-114 - [c25]Anshuman Singh, Arun Lakhotia:
Game-theoretic design of an information exchange model for detecting packed malware. MALWARE 2011: 1-7 - 2010
- [j22]Arun Lakhotia, Davidson R. Boccardo, Anshuman Singh, Aleardo Manacero Jr.:
Context-sensitive analysis without calling-context. High. Order Symb. Comput. 23(3): 275-313 (2010) - [c24]Arun Lakhotia, Davidson R. Boccardo, Anshuman Singh, Aleardo Manacero:
Context-sensitive analysis of obfuscated x86 executables. PEPM 2010: 131-140
2000 – 2009
- 2009
- [j21]Matthew Hayes, Andrew Walenstein, Arun Lakhotia:
Evaluation of malware phylogeny modelling systems using automated variant generation. J. Comput. Virol. 5(4): 335-343 (2009) - 2008
- [j20]Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia:
Constructing malware normalizers using term rewriting. J. Comput. Virol. 4(4): 307-322 (2008) - [c23]Mohamed R. Chouchane, Andrew Walenstein, Arun Lakhotia:
Using Markov chains to filter machine-morphed variants of malicious programs. MALWARE 2008: 77-84 - [c22]Kemal Efe, Alp V. Asutay, Arun Lakhotia:
A User Interface for Exploiting Web Communities in Searching the Web. WEBIST (2) 2008: 114-121 - 2007
- [j19]John Herpin, Afef Fekih, Suresh Golconda, Arun Lakhotia:
Steering Control of the Autonomous Vehicle: CajunBot. J. Aerosp. Comput. Inf. Commun. 4(12): 1134-1142 (2007) - 2006
- [j18]Guna Seetharaman, Arun Lakhotia, Erik Philip Blasch:
Unmanned Vehicles Come of Age: The DARPA Grand Challenge. Computer 39(12): 26-29 (2006) - [j17]Mark Harman, Arun Lakhotia, David W. Binkley:
Theory and algorithms for slicing unstructured programs. Inf. Softw. Technol. 48(7): 549-565 (2006) - [j16]Arun Lakhotia, Suresh Golconda, Anthony Maida, Pablo Mejia, Amit Puntambeker, Guna Seetharaman, Scott Wilson:
CajunBot: Architecture and algorithms. J. Field Robotics 23(8): 555-578 (2006) - [c21]Md. Enamul Karim, Laxmi Parida, Arun Lakhotia:
Using Permutation Patterns for Content-Based Phylogeny. PRIB 2006: 115-125 - [c20]Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia:
Normalizing Metamorphic Malware Using Term Rewriting. SCAM 2006: 75-84 - [c19]Mohamed R. Chouchane, Arun Lakhotia:
Using engine signature to detect metamorphic malware. WORM 2006: 73-78 - [i1]Andrew Walenstein, Arun Lakhotia:
The Software Similarity Problem in Malware Analysis. Duplication, Redundancy, and Similarity in Software 2006 - 2005
- [j15]Arun Lakhotia, Eric Uday Kumar, Michael Venable:
A Method for Detecting Obfuscated Calls in Malicious Binaries. IEEE Trans. Software Eng. 31(11): 955-968 (2005) - [j14]Md. Enamul Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida:
Malware phylogeny generation using permutations of code. J. Comput. Virol. 1(1-2): 13-23 (2005) - [c18]Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia:
Analyzing Memory Accesses in Obfuscated x86 Executables. DIMVA 2005: 1-18 - 2004
- [j13]Andrew Walenstein, Arun Lakhotia, Rainer Koschke:
The Second International Workshop on Detection of Software Clones: workshop report. ACM SIGSOFT Softw. Eng. Notes 29(2): 1-5 (2004) - [c17]Arun Lakhotia, Eric Uday Kumar:
Abstracting Stack to Detect Obfuscated Calls in Binaries. SCAM 2004: 17-26 - [c16]Arun Lakhotia, Prashant Pathak:
Virus Analysis: Techniques, Tools, and Research Issues. WCRE 2004: 2 - [c15]Arun Lakhotia, Moinuddin Mohammed:
Imposing Order on Program Statements to Assist Anti-Virus Scanners. WCRE 2004: 161-170 - 2003
- [c14]Prabhat K. Singh, Arun Lakhotia:
Static Verification of Worm and virus Behavior in binary Executables using Model Checking. IAW 2003: 298-300 - [c13]Arun Lakhotia, Junwei Li, Andrew Walenstein, Yun Yang:
Towards a Clone Detection Benchmark Suite and Results Archive. IWPC 2003: 285-287 - [c12]Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yang, Arun Lakhotia:
Problems Creating Task-relevant Clone Detection Reference Data. WCRE 2003: 285-295 - [c11]Arun Lakhotia, Andrew Walenstein, Rainer Koschke:
Second International Workshop on Detection of Software Clones. WCRE 2003: 368 - 2002
- [j12]Prabhat K. Singh, Arun Lakhotia:
Analysis and Detection of Computer Viruses and Worms: An Annotated Bibliography. ACM SIGPLAN Notices 37(2): 29-35 (2002) - 2000
- [c10]Jean-Christophe Deprez, Arun Lakhotia:
A Formalism to Automate Mapping from Program Features to Code. IWPC 2000: 69-78
1990 – 1999
- 1999
- [j11]Jagadeesh Nandigam, Arun Lakhotia, Claude G. Cech:
Experimental Evaluation of Agreement among Programmers in Applying the Rules of Cohesion. J. Softw. Maintenance Res. Pract. 11(1): 35-53 (1999) - [c9]Arun Lakhotia, Jean-Christophe Deprez:
Restructuring Functions with Low Cohesion. WCRE 1999: 36-46 - 1998
- [j10]Arun Lakhotia, Jean-Christophe Deprez:
Restructuring programs by tucking statements into functions. Inf. Softw. Technol. 40(11-12): 677-689 (1998) - [j9]Tat W. Chan, Arun Lakhotia:
Debugging program failure exhibited by voluminous data. J. Softw. Maintenance Res. Pract. 10(2): 111-150 (1998) - [c8]Arun Lakhotia:
DIME: A Direct Manipulation Environment for Evolutionary Development of Software. IWPC 1998: 72-79 - 1997
- [j8]Arun Lakhotia:
A Unified Framework For Expressing Software Subsystem Classification Techniques. J. Syst. Softw. 36(3): 211-231 (1997) - 1996
- [c7]John M. Gravley, Arun Lakhotia:
Identifying Enumeration Types Modeled with Symbolic Constants. WCRE 1996: 227- - 1995
- [c6]Arun Lakhotia, John M. Gravley:
Toward Experimental Evaluation of Subsystem Classification Recovery Techniques. WCRE 1995: 262-269 - 1994
- [j7]Jianxin Li, Arun Lakhotia:
Using Mathematical Induction in Systematic Program Development. Int. J. Softw. Eng. Knowl. Eng. 4(4): 561-574 (1994) - 1993
- [j6]Arun Lakhotia:
Understanding someone else's code: Analysis of experiences. J. Syst. Softw. 23(3): 269-275 (1993) - [c5]Arun Lakhotia:
Rule-Based Approach to Computing Module Cohesion. ICSE 1993: 35-44 - [c4]Arun Lakhotia:
Constructing Call Multigraphs Using Dependence Graphs. POPL 1993: 273-284 - 1992
- [j5]Arun Lakhotia:
Book Review: "software Engineering: a Holistic View". Int. J. Softw. Eng. Knowl. Eng. 2(3): 483-486 (1992) - 1990
- [j4]Arun Lakhotia, Leon Sterling:
How to Control Unfolding when Specializing Interpreters. New Gener. Comput. 8(1): 61-70 (1990) - [c3]Arun Lakhotia, Leon Sterling:
Program Development by Stepwise 'Enhancement'. SEKE 1990: 78-83
1980 – 1989
- 1989
- [c2]Arun Lakhotia:
Incorporating 'Programming Techniques' into Prolog Programs. NACLP 1989: 426-440 - 1988
- [j3]Arun Lakhotia, Leon Sterling:
Composing Recursive Logic Programs with Clausal Join. New Gener. Comput. 6(2&3): 211-225 (1988) - [c1]Leon Sterling, Arun Lakhotia:
Composing Prolog Meta-Interpreters. ICLP/SLP 1988: 386-403 - 1985
- [j2]Arun Lakhotia:
Implication and Equivalence I/O. ACM SIGOPS Oper. Syst. Rev. 19(1): 46-52 (1985) - 1983
- [j1]Arun Lakhotia:
An improvement over: "an improvement over deeply nested IF-THEN-ELSE control structure". ACM SIGPLAN Notices 18(5): 41-43 (1983)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint