Follow
Arun Lakhotia
Title
Cited by
Cited by
Year
Malware phylogeny generation using permutations of code
ME Karim, A Walenstein, A Lakhotia, L Parida
Journal in Computer Virology 1 (1-2), 13-23, 2005
3422005
Unmanned vehicles come of age: The DARPA grand challenge
G Seetharaman, A Lakhotia, EP Blasch
Computer 39 (12), 26-29, 2006
1972006
Droidlegacy: Automated familial classification of android malware
L Deshotels, V Notani, A Lakhotia
Proceedings of ACM SIGPLAN on program protection and reverse engineering …, 2014
1872014
Rule-based approach to computing module cohesion
A Lakhotia
Proceedings of 1993 15th International Conference on Software Engineering, 35-44, 1993
1601993
Restructuring programs by tucking statements into functions
A Lakhotia, JC Deprez
Information and Software Technology 40 (11-12), 677-689, 1998
1331998
A unified framework for expressing software subsystem classification techniques
A Lakhotia
Journal of Systems and Software 36 (3), 211-231, 1997
1331997
Fast location of similar code fragments using semantic'juice'
A Lakhotia, MD Preda, R Giacobazzi
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse …, 2013
1192013
The software similarity problem in malware analysis
A Walenstein, A Lakhotia
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2007
1122007
Understanding someone else's code: Analysis of experiences.
A Lakhotia
J. Syst. Softw. 23 (3), 269-275, 1993
1091993
Problems Creating Task-relevant Clone Detection Reference Data.
A Walenstein, N Jyoti, J Li, Y Yang, A Lakhotia
WCRE 3, 285, 2003
1082003
Normalizing metamorphic malware using term rewriting
A Walenstein, R Mathur, MR Chouchane, A Lakhotia
2006 Sixth IEEE International Workshop on Source Code Analysis and …, 2006
1072006
Exploiting similarity between variants to defeat malware
A Walenstein, M Venable, M Hayes, C Thompson, A Lakhotia
Proc. BlackHat DC Conf, 2007
912007
Using engine signature to detect metamorphic malware
MR Chouchane, A Lakhotia
Proceedings of the 4th ACM workshop on Recurring malcode, 73-78, 2006
892006
A method for detecting obfuscated calls in malicious binaries
A Lakhotia, EU Kumar, M Venable
IEEE transactions on Software Engineering 31 (11), 955-968, 2005
872005
Tracking concept drift in malware families
A Singh, A Walenstein, A Lakhotia
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
712012
Static verification of worm and virus behavior in binary executables using model checking
PK Singh, A Lakhotia
IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop …, 2003
682003
Are metamorphic viruses really invincible
A Lakhotia, A Kapoor, EU Kumar
Virus Bulletin 12, 57, 2004
642004
Malware analysis and attribution using genetic information
A Pfeffer, C Call, J Chamberlain, L Kellogg, J Ouellette, T Patten, ...
2012 7th International Conference on Malicious and Unwanted Software, 39-45, 2012
632012
Analysis and detection of computer viruses and worms: An annotated bibliography
PK Singh, A Lakhotia
ACM SIGPLAN Notices 37 (2), 29-35, 2002
612002
Imposing order on program statements to assist anti-virus scanners
A Lakhotia, M Mohammed
11th Working Conference on Reverse Engineering, 161-170, 2004
582004
The system can't perform the operation now. Try again later.
Articles 1–20