Arun Lakhotia - Publications

Affiliations: 
University of Louisiana at Lafayette, Lafayette, LA, United States 
Area:
Computer Science, Artificial Intelligence, Robotics Engineering

53 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Preda MD, Giacobazzi R, Lakhotia A, Mastroeni I. Abstract symbolic automata : Mixed syntactic/semantic similarity analysis of executables Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 2015: 329-341. DOI: 10.1145/2676726.2676986  1
2015 LeDoux C, Lakhotia A. Malware and machine learning Studies in Computational Intelligence. 563: 1-42. DOI: 10.1007/978-3-319-08624-8_1  1
2014 Deshotels L, Notani V, Lakhotia A. DroidLegacy: Automated familial classification of Android malware Proceedings of the 3rd Acm Sigplan Program Protection and Reverse Engineering Workshop 2014, Pprew 2014. DOI: 10.1145/2556464.2556467  1
2014 Miles C, Lakhotia A, Ledoux C, Newsom A, Notani V. VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence 7th International Symposium On Resilient Control Systems, Isrcs 2014. DOI: 10.1109/ISRCS.2014.6900103  1
2014 Ruttenberg B, Miles C, Kellogg L, Notani V, Howard M, LeDoux C, Lakhotia A, Pfeffer A. Identifying shared software components to support malware forensics Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8550: 21-40. DOI: 10.1007/978-3-319-08509-8_2  1
2013 Lakhotia A, Preda MD, Giacobazzi R. Fast location of similar code fragments using semantic 'juice' Proceedings of the 2nd Acm Sigplan Program Protection and Reverse Engineering Workshop 2013, Pprew 2013. DOI: 10.1145/2430553.2430558  1
2013 Ouellette J, Pfeffer A, Lakhotia A. Countering malware evolution using cloud-based learning Proceedings of the 2013 8th International Conference On Malicious and Unwanted Software: "the Americas", Malware 2013. 85-94. DOI: 10.1109/MALWARE.2013.6703689  1
2013 Chouchane R, Stakhanova N, Walenstein A, Lakhotia A. Detecting machine-morphed malware variants via engine attribution Journal in Computer Virology. 9: 137-157. DOI: 10.1007/S11416-013-0183-6  1
2013 Lakhotia A, Walenstein A, Miles C, Singh A. VILO: A rapid learning nearest-neighbor classifier for malware triage Journal in Computer Virology. 9: 109-123. DOI: 10.1007/S11416-013-0178-3  1
2012 Singh A, Walenstein A, Lakhotia A. Tracking concept drift in malware families Proceedings of the Acm Conference On Computer and Communications Security. 81-92. DOI: 10.1145/2381896.2381910  1
2012 Pfeffer A, Call C, Chamberlain J, Kellogg L, Ouellette J, Patten T, Zacharias G, Lakhotia A, Golconda S, Bay J, Hall R, Scofield D. Malware analysis and attribution using genetic information Proceedings of the 2012 7th International Conference On Malicious and Unwanted Software, Malware 2012. 39-45. DOI: 10.1109/MALWARE.2012.6461006  1
2012 Walenstein A, Lakhotia A. A transformation-based model of malware derivation Proceedings of the 2012 7th International Conference On Malicious and Unwanted Software, Malware 2012. 17-25. DOI: 10.1109/MALWARE.2012.6461003  1
2012 Miles C, Lakhotia A, Walenstein A. In situ reuse of logically extracted functional components Journal in Computer Virology. 8: 73-84. DOI: 10.1007/S11416-012-0167-Y  1
2012 Walenstein A, Deshotels L, Lakhotia A. Program structure-based feature selection for Android malware analysis Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 107: 51-52. DOI: 10.1007/978-3-642-33392-7_5  1
2012 Singh A, Singh S, Walenstein A, Lakhotia A. Deployable classifiers for malware detection Communications in Computer and Information Science. 285: 384-395. DOI: 10.1007/978-3-642-29166-1_34  1
2012 LeDoux C, Walenstein A, Lakhotia A. Improved malware classification through sensor fusion using disjoint union Communications in Computer and Information Science. 285: 360-371. DOI: 10.1007/978-3-642-29166-1_32  1
2012 Dalla Preda M, Feng W, Giacobazzi R, Greechie R, Lakhotia A. Twisting additivity in program obfuscation Communications in Computer and Information Science. 285: 336-347. DOI: 10.1007/978-3-642-29166-1_30  1
2011 Singh A, Singh S, Walenstein A, Lakhotia A. On deployable adversarial classification models Proceedings of the Acm Conference On Computer and Communications Security. 113-114. DOI: 10.1145/2046684.2046706  1
2011 Singh A, Lakhotia A. Game-theoretic design of an information exchange model for detecting packed malware Proceedings of the 2011 6th International Conference On Malicious and Unwanted Software, Malware 2011. 1-7. DOI: 10.1109/MALWARE.2011.6112319  1
2011 Efe K, Asutay A, Lakhotia A. Exploring web neighbours in exploratory search International Journal of Web Information Systems. 7: 152-182. DOI: 10.1108/17440081111141781  1
2011 Singh A, Lakhotia A, Walenstein A. Malware antimalware games 5th European Conference On Information Management and Evaluation, Ecime 2011. 319-327.  1
2010 Lakhotia A, Boccardo DR, Singh A, Manacero A. Context-sensitive analysis of obfuscated x86 executables Proceedings of the Acm Sigplan Symposium On Partial Evaluation and Semantics-Based Program Manipulation. 131-140. DOI: 10.1145/1706356.1706381  1
2010 Lakhotia A, Boccardo DR, Singh A, Manacero A. Context-sensitive analysis without calling-context Higher-Order and Symbolic Computation. 23: 275-313. DOI: 10.1007/s10990-011-9080-1  1
2009 Hayes M, Walenstein A, Lakhotia A. Evaluation of malware phylogeny modelling systems using automated variant generation Journal in Computer Virology. 5: 335-343. DOI: 10.1007/S11416-008-0100-6  1
2008 Chouchane MR, Walenstein A, Lakhotia A. Using markov chains to filter machine-morphed variants of malicious programs 3rd International Conference On Malicious and Unwanted Software, Malware 2008. 77-84. DOI: 10.1109/MALWARE.2008.4690861  1
2008 Walenstein A, Mathur R, Chouchane MR, Lakhotia A. Constructing malware normalizers using term rewriting Journal in Computer Virology. 4: 307-322. DOI: 10.1007/S11416-008-0081-5  1
2008 Efe K, Asutay AV, Lakhotia A. A user interface for exploiting Web communities in searching the Web Webist 2008 - 4th International Conference On Web Information Systems and Technologies, Proceedings. 2: 114-121.  1
2007 Herpin J, Fekih A, Golconda S, Lakhotia A. Steering control of the autonomous vehicle: CajunBot Journal of Aerospace Computing, Information and Communication. 4: 1134-1142. DOI: 10.2514/1.35050  1
2007 Chouchane MR, Walenstein A, Lakhotia A. Statistical signatures for fast filtering of instruction-substituting metamorphic malware Worm'07 - Proceedings of the 2007 Acm Workshop On Recurring Malcode. 31-37. DOI: 10.1145/1314389.1314397  1
2007 Lakhotia A, Golconda S, Maida A, Mejia P, Puntambeker A, Seetharaman G, Wilson S. CajunBot: Architecture and algorithms Springer Tracts in Advanced Robotics. 36: 245-280. DOI: 10.1007/978-3-540-73429-1_8  1
2007 Walenstein A, Mathur R, Chouchane M, Lakhotia A. The design space of metamorphic malware Iciw 2007: 2nd International Conference On I-Warfare and Security. 241-248.  1
2006 Maida AS, Golconda S, Mejia P, Lakhotia A, Cavanaugh C. Subgoal-based local navigation and obstacle avoidance using a grid-distance field International Journal of Vehicle Autonomous Systems. 4: 122-142. DOI: 10.1504/Ijvas.2006.012203  1
2006 Chouchane MR, Lakhotia A. Using engine signature to detect metamorphic malware Proceedings of the 4th Acm Workshop On Recurring Malcode, Worm'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 73-78. DOI: 10.1145/1179542.1179558  1
2006 Walenstein A, Mathur R, Chouchane MR, Lakhotia A. Normalizing metamorphic malware using term rewriting Proceedings - Sixth Ieee International Workshop On Source Code Analysis and Manipulation, Scam 2006. 75-84. DOI: 10.1109/SCAM.2006.20  1
2006 Harman M, Lakhotia A, Binkley D. Theory and algorithms for slicing unstructured programs Information and Software Technology. 48: 549-565. DOI: 10.1016/J.Infsof.2005.06.001  1
2006 Lakhotia A, Golconda S, Maida A, Mejia P, Puntambeker A, Seetharaman G, Wilson S. Field report: CajunBot: Architecture and algorithms Journal of Field Robotics. 23: 555-578. DOI: 10.1002/Rob.20129  1
2006 Karim ME, Parida L, Lakhotia A. Using permutation patterns for content-based phylogeny Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4146: 115-125.  1
2005 Lakhotia A, Kumar EU, Venable M. A method for detecting obfuscated calls in malicious binaries Ieee Transactions On Software Engineering. 31: 955-967. DOI: 10.1109/Tse.2005.120  1
2005 Karim ME, Walenstein A, Lakhotia A, Parida L. Malware phylogeny generation using permutations of code Journal in Computer Virology. 1: 13-23. DOI: 10.1007/S11416-005-0002-9  1
2005 Venable M, Chouchane MR, Karim ME, Lakhotia A. Analyzing memory accesses in obfuscated x86 executables Lecture Notes in Computer Science. 3548: 1-18.  1
2004 Lakhotia A, Kumar EU. Abstracting stack to detect obfuscated calls in binaries Proceedings - Fourth Ieee International Workshop On Source Code Analysis and Manipulation. 17-28. DOI: 10.1109/SCAM.2004.2  1
2004 Lakhotia A, Mohammed M. Imposing order on program statements to assist anti-virus scanners Proceedings - Working Conference On Reverse Engineering, Wcre. 161-170.  1
2004 Lakhotia A, Pathak P. Virus analysis: Techniques, tools, and research issues tutorial Proceedings - Working Conference On Reverse Engineering, Wcre. 2.  1
2003 Lakhotia A, Walenstein A, Koschke R. Second International Workshop on Detection of Software Clones Reverse Engineering - Working Conference Proceedings. 368. DOI: 10.1109/WCRE.2003.1287269  1
2003 Walenstein A, Jyoti N, Li J, Yang Y, Lakhotia A. Problems Creating Task-relevant Clone Detection Reference Data Reverse Engineering - Working Conference Proceedings. 285-294. DOI: 10.1109/WCRE.2003.1287259  1
2003 Singh PK, Lakhotia A. Static verification of worm and virus behavior in binary executables using model checking Ieee Systems, Man and Cybernetics Society Information Assurance Workshop. 298-300. DOI: 10.1109/SMCSIA.2003.1232440  1
1999 Nandigam J, Lakhotia A, Čech CG. Experimental Evaluation of Agreement among Programmers in Applying the Rules of Cohesion Journal of Software Maintenance and Evolution. 11: 35-53.  1
1998 Lakhotia A, Deprez JC. Restructuring programs by tucking statements into functions Information and Software Technology. 40: 677-689. DOI: 10.1016/S0950-5849(98)00091-3  1
1998 Chan TW, Lakhotia A. Debugging program failure exhibited by voluminous data Journal of Software Maintenance and Evolution. 10: 111-150. DOI: 10.1002/(Sici)1096-908X(199803/04)10:2<111::Aid-Smr167>3.0.Co;2-8  1
1997 Lakhotia A. A unified framework for expressing software subsystem classification techniques Journal of Systems and Software. 36: 211-231. DOI: 10.1016/0164-1212(95)00098-4  1
1993 Lakhotia A. Understanding someone else's code: Analysis of experiences The Journal of Systems and Software. 23: 269-275. DOI: 10.1016/0164-1212(93)90101-3  1
1990 Lakhotia A, Sterling L. How to control unfolding when specializing interpreters New Generation Computing. 8: 61-70. DOI: 10.1007/Bf03037513  1
1988 Lakhotia A, Sterling L. Composing recursive logic programs with Clausal join New Generation Computing. 6: 211-225. DOI: 10.1007/Bf03037138  1
Show low-probability matches.