Follow
Arun Lakhotia
Title
Cited by
Cited by
Year
Malware phylogeny generation using permutations of code
ME Karim, A Walenstein, A Lakhotia, L Parida
Journal in Computer Virology 1 (1-2), 13-23, 2005
3342005
Droidlegacy: Automated familial classification of android malware
L Deshotels, V Notani, A Lakhotia
Proceedings of ACM SIGPLAN on program protection and reverse engineering …, 2014
1772014
Unmanned vehicles come of age: The DARPA grand challenge
G Seetharaman, A Lakhotia, EP Blasch
Computer 39 (12), 26-29, 2006
1752006
Rule-based approach to computing module cohesion
A Lakhotia
Proceedings of 1993 15th International Conference on Software Engineering, 35-44, 1993
1611993
A unified framework for expressing software subsystem classification techniques
A Lakhotia
Journal of Systems and Software 36 (3), 211-231, 1997
1381997
Restructuring programs by tucking statements into functions
A Lakhotia, JC Deprez
Information and Software Technology 40 (11-12), 677-689, 1998
1281998
Fast location of similar code fragments using semantic'juice'
A Lakhotia, MD Preda, R Giacobazzi
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse …, 2013
1112013
Understanding someone else's code: Analysis of experiences.
A Lakhotia
J. Syst. Softw. 23 (3), 269-275, 1993
1091993
The software similarity problem in malware analysis
A Walenstein, A Lakhotia
Dagstuhl Seminar Proceedings, 2007
1072007
Normalizing metamorphic malware using term rewriting
A Walenstein, R Mathur, MR Chouchane, A Lakhotia
2006 Sixth IEEE International Workshop on Source Code Analysis and …, 2006
1062006
Problems Creating Task-relevant Clone Detection Reference Data.
A Walenstein, N Jyoti, J Li, Y Yang, A Lakhotia
WCRE 3, 285, 2003
1042003
A method for detecting obfuscated calls in malicious binaries
A Lakhotia, EU Kumar, M Venable
IEEE transactions on Software Engineering 31 (11), 955-968, 2005
872005
Exploiting similarity between variants to defeat malware
A Walenstein, M Venable, M Hayes, C Thompson, A Lakhotia
Proc. BlackHat DC Conf, 2007
852007
Using engine signature to detect metamorphic malware
MR Chouchane, A Lakhotia
Proceedings of the 4th ACM workshop on Recurring malcode, 73-78, 2006
842006
Static verification of worm and virus behavior in binary executables using model checking
PK Singh, A Lakhotia
IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop …, 2003
682003
Tracking concept drift in malware families
A Singh, A Walenstein, A Lakhotia
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
622012
Malware analysis and attribution using genetic information
A Pfeffer, C Call, J Chamberlain, L Kellogg, J Ouellette, T Patten, ...
2012 7th International Conference on Malicious and Unwanted Software, 39-45, 2012
612012
Analysis and detection of computer viruses and worms: An annotated bibliography
PK Singh, A Lakhotia
ACM SIGPLAN Notices 37 (2), 29-35, 2002
612002
Are metamorphic viruses really invincible
A Lakhotia, A Kapoor, EU Kumar
Virus Bulletin 12, 57, 2004
602004
Constructing call multigraphs using dependence graphs
A Lakhotia
Proceedings of the 20th ACM SIGPLAN-SIGACT Symposium on Principles of …, 1993
591993
The system can't perform the operation now. Try again later.
Articles 1–20