Följ
Arun Lakhotia
Arun Lakhotia
Verifierad e-postadress på louisiana.edu - Startsida
Titel
Citeras av
Citeras av
År
Malware phylogeny generation using permutations of code
ME Karim, A Walenstein, A Lakhotia, L Parida
Journal in Computer Virology 1 (1-2), 13-23, 2005
3352005
Unmanned vehicles come of age: The DARPA grand challenge
G Seetharaman, A Lakhotia, EP Blasch
Computer 39 (12), 26-29, 2006
1882006
Droidlegacy: Automated familial classification of android malware
L Deshotels, V Notani, A Lakhotia
Proceedings of ACM SIGPLAN on program protection and reverse engineering …, 2014
1792014
Rule-based approach to computing module cohesion
A Lakhotia
Proceedings of 1993 15th International Conference on Software Engineering, 35-44, 1993
1601993
A unified framework for expressing software subsystem classification techniques
A Lakhotia
Journal of Systems and Software 36 (3), 211-231, 1997
1361997
Restructuring programs by tucking statements into functions
A Lakhotia, JC Deprez
Information and Software Technology 40 (11-12), 677-689, 1998
1301998
Fast location of similar code fragments using semantic'juice'
A Lakhotia, MD Preda, R Giacobazzi
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse …, 2013
1132013
Understanding someone else's code: Analysis of experiences.
A Lakhotia
J. Syst. Softw. 23 (3), 269-275, 1993
1111993
The software similarity problem in malware analysis
A Walenstein, A Lakhotia
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2007
1082007
Normalizing metamorphic malware using term rewriting
A Walenstein, R Mathur, MR Chouchane, A Lakhotia
2006 Sixth IEEE International Workshop on Source Code Analysis and …, 2006
1052006
Problems Creating Task-relevant Clone Detection Reference Data.
A Walenstein, N Jyoti, J Li, Y Yang, A Lakhotia
WCRE 3, 285, 2003
1042003
Exploiting similarity between variants to defeat malware
A Walenstein, M Venable, M Hayes, C Thompson, A Lakhotia
Proc. BlackHat DC Conf, 2007
872007
A method for detecting obfuscated calls in malicious binaries
A Lakhotia, EU Kumar, M Venable
IEEE transactions on Software Engineering 31 (11), 955-968, 2005
872005
Using engine signature to detect metamorphic malware
MR Chouchane, A Lakhotia
Proceedings of the 4th ACM workshop on Recurring malcode, 73-78, 2006
862006
Static verification of worm and virus behavior in binary executables using model checking
PK Singh, A Lakhotia
IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop …, 2003
682003
Tracking concept drift in malware families
A Singh, A Walenstein, A Lakhotia
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
652012
Are metamorphic viruses really invincible
A Lakhotia, A Kapoor, EU Kumar
Virus Bulletin 12, 57, 2004
622004
Malware analysis and attribution using genetic information
A Pfeffer, C Call, J Chamberlain, L Kellogg, J Ouellette, T Patten, ...
2012 7th International Conference on Malicious and Unwanted Software, 39-45, 2012
612012
Analysis and detection of computer viruses and worms: An annotated bibliography
PK Singh, A Lakhotia
ACM SIGPLAN Notices 37 (2), 29-35, 2002
612002
Constructing call multigraphs using dependence graphs
A Lakhotia
Proceedings of the 20th ACM SIGPLAN-SIGACT Symposium on Principles of …, 1993
591993
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20