Arun Lakhotia

Orcid: 0000-0001-9943-7795

Affiliations:
  • University of Louisiana at Lafayette, USA


According to our database1, Arun Lakhotia authored at least 77 papers between 1983 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Reverse Engineering Structure and Semantics of Input of a Binary Executable.
CoRR, 2024

2022
Recovering Structure of Input of a Binary Program.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2020
Digital Threats: Research and Practice Inaugural Issue Editorial.
DTRAP, 2020

Identifying Cross-Version Function Similarity Using Contextual Features.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Evolved Similarity Techniques in Malware Analysis.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Malware Economics and its Implication to Anti-Malware Situational Awareness.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

Cluster analysis for deobfuscation of malware variants during ransomware attacks.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2017
Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281).
Dagstuhl Reports, 2017

Artificial Intelligence Based Malware Analysis.
CoRR, 2017

Mining malware secrets.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

2015
Malware and Machine Learning.
Proceedings of the Intelligent Methods for Cyber Warfare, 2015

Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

2014
DroidLegacy: Automated Familial Classification of Android Malware.
Proceedings of the 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2014, 2014

Identifying Shared Software Components to Support Malware Forensics.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

2013
VILO: a rapid learning nearest-neighbor classifier for malware triage.
J. Comput. Virol. Hacking Tech., 2013

Detecting machine-morphed malware variants via engine attribution.
J. Comput. Virol. Hacking Tech., 2013

Fast location of similar code fragments using semantic 'juice'.
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2013, 2013

Countering malware evolution using cloud-based learning.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

FuncTracker: Discovering Shared Code to Aid Malware Forensics.
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013

2012
In situ reuse of logically extracted functional components.
J. Comput. Virol., 2012

Program Structure-Based Feature Selection for Android Malware Analysis.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

A transformation-based model of malware derivation.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

Malware Analysis and attribution using Genetic Information.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

Deployable Classifiers for Malware Detection.
Proceedings of the Information Systems, Technology and Management, 2012

Twisting Additivity in Program Obfuscation.
Proceedings of the Information Systems, Technology and Management, 2012

Improved Malware Classification through Sensor Fusion Using Disjoint Union.
Proceedings of the Information Systems, Technology and Management, 2012

Tracking concept drift in malware families.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Exploring web neighbours in exploratory search.
Int. J. Web Inf. Syst., 2011

Game-theoretic design of an information exchange model for detecting packed malware.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

On deployable adversarial classification models.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Context-sensitive analysis without calling-context.
High. Order Symb. Comput., 2010

Context-sensitive analysis of obfuscated x86 executables.
Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2010

2009
Evaluation of malware phylogeny modelling systems using automated variant generation.
J. Comput. Virol., 2009

2008
Constructing malware normalizers using term rewriting.
J. Comput. Virol., 2008

A User Interface for Exploiting Web Communities in Searching the Web.
Proceedings of the WEBIST 2008, 2008

Using Markov chains to filter machine-morphed variants of malicious programs.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

2007
Steering Control of the Autonomous Vehicle: CajunBot.
J. Aerosp. Comput. Inf. Commun., 2007

2006
CajunBot: Architecture and algorithms.
J. Field Robotics, 2006

Theory and algorithms for slicing unstructured programs.
Inf. Softw. Technol., 2006

Unmanned Vehicles Come of Age: The DARPA Grand Challenge.
Computer, 2006

Using engine signature to detect metamorphic malware.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006

Normalizing Metamorphic Malware Using Term Rewriting.
Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 2006

Using Permutation Patterns for Content-Based Phylogeny.
Proceedings of the Pattern Recognition in Bioinformatics, International Workshop, 2006

The Software Similarity Problem in Malware Analysis.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

2005
Malware phylogeny generation using permutations of code.
J. Comput. Virol., 2005

A Method for Detecting Obfuscated Calls in Malicious Binaries.
IEEE Trans. Software Eng., 2005

Analyzing Memory Accesses in Obfuscated x86 Executables.
Proceedings of the Detection of Intrusions and Malware, 2005

2004
The Second International Workshop on Detection of Software Clones: workshop report.
ACM SIGSOFT Softw. Eng. Notes, 2004

Virus Analysis: Techniques, Tools, and Research Issues.
Proceedings of the 11th Working Conference on Reverse Engineering, 2004

Imposing Order on Program Statements to Assist Anti-Virus Scanners.
Proceedings of the 11th Working Conference on Reverse Engineering, 2004

Abstracting Stack to Detect Obfuscated Calls in Binaries.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

2003
Problems Creating Task-relevant Clone Detection Reference Data.
Proceedings of the 10th Working Conference on Reverse Engineering, 2003

Second International Workshop on Detection of Software Clones.
Proceedings of the 10th Working Conference on Reverse Engineering, 2003

Towards a Clone Detection Benchmark Suite and Results Archive.
Proceedings of the 11th International Workshop on Program Comprehension (IWPC 2003), 2003

Static Verification of Worm and virus Behavior in binary Executables using Model Checking.
Proceedings of the IEEE Systems, 2003

2002
Analysis and Detection of Computer Viruses and Worms: An Annotated Bibliography.
ACM SIGPLAN Notices, 2002

2000
A Formalism to Automate Mapping from Program Features to Code.
Proceedings of the 8th International Workshop on Program Comprehension (IWPC 2000), 2000

1999
Experimental Evaluation of Agreement among Programmers in Applying the Rules of Cohesion.
J. Softw. Maintenance Res. Pract., 1999

Restructuring Functions with Low Cohesion.
Proceedings of the Sixth Working Conference on Reverse Engineering, 1999

1998
Debugging program failure exhibited by voluminous data.
J. Softw. Maintenance Res. Pract., 1998

Restructuring programs by tucking statements into functions.
Inf. Softw. Technol., 1998

DIME: A Direct Manipulation Environment for Evolutionary Development of Software.
Proceedings of the 6th International Workshop on Program Comprehension (IWPC '98), 1998

1997
A Unified Framework For Expressing Software Subsystem Classification Techniques.
J. Syst. Softw., 1997

1996
Identifying Enumeration Types Modeled with Symbolic Constants.
Proceedings of the 3rd Working Conference on Reverse Engineering, 1996

1995
Toward Experimental Evaluation of Subsystem Classification Recovery Techniques.
Proceedings of the 2nd Working Conference on Reverse Engineering, 1995

1994
Using Mathematical Induction in Systematic Program Development.
Int. J. Softw. Eng. Knowl. Eng., 1994

1993
Understanding someone else's code: Analysis of experiences.
J. Syst. Softw., 1993

Constructing Call Multigraphs Using Dependence Graphs.
Proceedings of the Conference Record of the Twentieth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1993

Rule-Based Approach to Computing Module Cohesion.
Proceedings of the 15th International Conference on Software Engineering, 1993

1992
Book Review: "software Engineering: a Holistic View".
Int. J. Softw. Eng. Knowl. Eng., 1992

1990
How to Control Unfolding when Specializing Interpreters.
New Gener. Comput., 1990

Program Development by Stepwise 'Enhancement'.
Proceedings of the SEKE'90, 1990

1989
Incorporating 'Programming Techniques' into Prolog Programs.
Proceedings of the Logic Programming, 1989

1988
Composing Recursive Logic Programs with Clausal Join.
New Gener. Comput., 1988

Composing Prolog Meta-Interpreters.
Proceedings of the Logic Programming, 1988

1985
Implication and Equivalence I/O.
ACM SIGOPS Oper. Syst. Rev., 1985

1983
An improvement over: "an improvement over deeply nested IF-THEN-ELSE control structure".
ACM SIGPLAN Notices, 1983


  Loading...