Arun Lakhotia
Arun Lakhotia
Dirección de correo verificada de louisiana.edu - Página principal
Título
Citado por
Citado por
Año
Malware phylogeny generation using permutations of code
ME Karim, A Walenstein, A Lakhotia, L Parida
Journal in Computer Virology 1 (1-2), 13-23, 2005
2512005
Rule-based approach to computing module cohesion
A Lakhotia
Proceedings of 1993 15th International Conference on Software Engineering, 35-44, 1993
1431993
A unified framework for expressing software subsystem classification techniques
A Lakhotia
Journal of Systems and Software 36 (3), 211-231, 1997
1281997
Unmanned vehicles come of age: The DARPA grand challenge
G Seetharaman, A Lakhotia, EP Blasch
Computer 39 (12), 26-29, 2006
1212006
Restructuring programs by tucking statements into functions
A Lakhotia, JC Deprez
Information and Software Technology 40 (11-12), 677-689, 1998
1151998
Droidlegacy: Automated familial classification of android malware
L Deshotels, V Notani, A Lakhotia
Proceedings of ACM SIGPLAN on program protection and reverse engineering …, 2014
1022014
Normalizing metamorphic malware using term rewriting
A Walenstein, R Mathur, MR Chouchane, A Lakhotia
2006 Sixth IEEE International Workshop on Source Code Analysis and …, 2006
942006
Understanding someone else's code: Analysis of experiences.
A Lakhotia
Journal of Systems and Software 23 (3), 269-275, 1993
901993
Problems Creating Task-relevant Clone Detection Reference Data.
A Walenstein, N Jyoti, J Li, Y Yang, A Lakhotia
WCRE 3, 285, 2003
832003
Using engine signature to detect metamorphic malware
MR Chouchane, A Lakhotia
Proceedings of the 4th ACM workshop on Recurring malcode, 73-78, 2006
752006
Fast location of similar code fragments using semantic'juice'
A Lakhotia, MD Preda, R Giacobazzi
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse …, 2013
722013
The software similarity problem in malware analysis
A Walenstein, A Lakhotia
Dagstuhl Seminar Proceedings, 2007
722007
A method for detecting obfuscated calls in malicious binaries
A Lakhotia, EU Kumar, M Venable
IEEE transactions on Software Engineering 31 (11), 955-968, 2005
712005
Exploiting similarity between variants to defeat malware
A Walenstein, M Venable, M Hayes, C Thompson, A Lakhotia
Proc. BlackHat DC Conf, 2007
702007
Imposing order on program statements to assist anti-virus scanners
A Lakhotia, M Mohammed
11th Working Conference on Reverse Engineering, 161-170, 2004
552004
Static verification of worm and virus behavior in binary executables using model checking
PK Singh, A Lakhotia
IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop …, 2003
552003
Analysis and detection of computer viruses and worms: An annotated bibliography
PK Singh, A Lakhotia
ACM SIGPLAN Notices 37 (2), 29-35, 2002
552002
Are metamorphic viruses really invincible
A Lakhotia, A Kapoor, EU Kumar
Virus Bulletin 12, 57, 2004
532004
Constructing call multigraphs using dependence graphs
A Lakhotia
Proceedings of the 20th ACM SIGPLAN-SIGACT symposium on Principles of …, 1993
491993
Composing Prolog Meta-Interpreters.
L Sterling, A Lakhotia
ICLP/SLP, 386-403, 1988
451988
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20