Malware phylogeny generation using permutations of code ME Karim, A Walenstein, A Lakhotia, L Parida Journal in Computer Virology 1 (1-2), 13-23, 2005 | 342 | 2005 |
Unmanned vehicles come of age: The DARPA grand challenge G Seetharaman, A Lakhotia, EP Blasch Computer 39 (12), 26-29, 2006 | 197 | 2006 |
Droidlegacy: Automated familial classification of android malware L Deshotels, V Notani, A Lakhotia Proceedings of ACM SIGPLAN on program protection and reverse engineering …, 2014 | 187 | 2014 |
Rule-based approach to computing module cohesion A Lakhotia Proceedings of 1993 15th International Conference on Software Engineering, 35-44, 1993 | 160 | 1993 |
Restructuring programs by tucking statements into functions A Lakhotia, JC Deprez Information and Software Technology 40 (11-12), 677-689, 1998 | 133 | 1998 |
A unified framework for expressing software subsystem classification techniques A Lakhotia Journal of Systems and Software 36 (3), 211-231, 1997 | 133 | 1997 |
Fast location of similar code fragments using semantic'juice' A Lakhotia, MD Preda, R Giacobazzi Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse …, 2013 | 119 | 2013 |
The software similarity problem in malware analysis A Walenstein, A Lakhotia Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2007 | 112 | 2007 |
Understanding someone else's code: Analysis of experiences. A Lakhotia J. Syst. Softw. 23 (3), 269-275, 1993 | 109 | 1993 |
Problems Creating Task-relevant Clone Detection Reference Data. A Walenstein, N Jyoti, J Li, Y Yang, A Lakhotia WCRE 3, 285, 2003 | 108 | 2003 |
Normalizing metamorphic malware using term rewriting A Walenstein, R Mathur, MR Chouchane, A Lakhotia 2006 Sixth IEEE International Workshop on Source Code Analysis and …, 2006 | 107 | 2006 |
Exploiting similarity between variants to defeat malware A Walenstein, M Venable, M Hayes, C Thompson, A Lakhotia Proc. BlackHat DC Conf, 2007 | 91 | 2007 |
Using engine signature to detect metamorphic malware MR Chouchane, A Lakhotia Proceedings of the 4th ACM workshop on Recurring malcode, 73-78, 2006 | 89 | 2006 |
A method for detecting obfuscated calls in malicious binaries A Lakhotia, EU Kumar, M Venable IEEE transactions on Software Engineering 31 (11), 955-968, 2005 | 87 | 2005 |
Tracking concept drift in malware families A Singh, A Walenstein, A Lakhotia Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012 | 71 | 2012 |
Static verification of worm and virus behavior in binary executables using model checking PK Singh, A Lakhotia IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop …, 2003 | 68 | 2003 |
Are metamorphic viruses really invincible A Lakhotia, A Kapoor, EU Kumar Virus Bulletin 12, 57, 2004 | 64 | 2004 |
Malware analysis and attribution using genetic information A Pfeffer, C Call, J Chamberlain, L Kellogg, J Ouellette, T Patten, ... 2012 7th International Conference on Malicious and Unwanted Software, 39-45, 2012 | 63 | 2012 |
Analysis and detection of computer viruses and worms: An annotated bibliography PK Singh, A Lakhotia ACM SIGPLAN Notices 37 (2), 29-35, 2002 | 61 | 2002 |
Imposing order on program statements to assist anti-virus scanners A Lakhotia, M Mohammed 11th Working Conference on Reverse Engineering, 161-170, 2004 | 58 | 2004 |