You are here

Publications

  • Marrying Unknown Cyber and LLM to Detect Supply Chain Attacks, Miller, Bob & Arun Lakhotia, 2024
  • Lakhotia, A., Boccardo, D.R., Singh, A. et al. Context-sensitive analysis without calling-context. Higher-Order Symb Comput 23, 275–313 (2010). https://doi.org/10.1007/s10990-011-9080-1
  • Malware phylogeny generation using permutations of code ME Karim, A Walenstein, A Lakhotia, L Parida, Journal in Computer Virology 1 (1-2), 13-23, 2005
  • Unmanned vehicles come of age: The DARPA grand challenge G Seetharaman, A Lakhotia, EP Blasch, Computer 39 (12), 26-29 202 2006
  • Droidlegacy: Automated familial classification of android malware L. Deshotels, V Notani, A Lakhotia, Proceedings of ACM SIGPLAN on program protection and reverse engineering 2014
  • Rule-based approach to computing module cohesion, A Lakhotia, Proceedings of 1993 15th International Conference on Software Engineering, 35-44, 1993
  • Restructuring programs by tucking statements into functions, A Lakhotia, JC Deprez, Information and Software Technology 40 (11-12), 677-689, 1998
  • A unified framework for expressing software subsystem classification techniques, A Lakhotia, Journal of Systems and Software 36 (3), 211-231, 1997
  • Fast location of similar code fragments using semantic 'juice', A Lakhotia, MD Preda, R Giacobazzi, Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse, 2013
  • The software similarity problem in malware analysis, A Walenstein, A Lakhotia, Schloss-Dagstuhl-Leibniz Zentrum für Informatik,, 2007
  • Problems Creating Task-relevant Clone Detection Reference Data, A Walenstein, N Jyoti, J Li, Y Yang, A Lakhotia, WCRE 3, 285, 2003
  • Understanding someone else's code: Analysis of experiences. A Lakhotia, J. Syst. Softw. 23 (3), 269-275, 1993
  • Normalizing metamorphic malware using term rewriting, A Walenstein, R Mathur, MR Chouchane, A Lakhotia, 2006 Sixth IEEE International Workshop on Source Code Analysis, 2006
  • Exploiting similarity between variants to defeat malware, A Walenstein, M Venable, M Hayes, C Thompson, A Lakhotia, Proc. BlackHat DC Conf, 2007
  • Using engine signature to detect metamorphic malware, MR Chouchane, A Lakhotia, Proceedings of the 4th ACM workshop on Recurring malcode, 73-78, 2006
  • A method for detecting obfuscated calls in malicious binaries, A Lakhotia, EU Kumar, M Venable, IEEE Transactions on Software Engineering 31 (11), 955-968, 2005
  • Tracking concept drift in malware families, A Singh, A Walenstein, A Lakhotia, Proceedings of the 5th ACM workshop on Security and artificial intelligence, 2012
  • Static verification of worm and virus behavior in binary executables using model checking, PK Singh, A Lakhotia, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop,  2003
  • Are metamorphic viruses really invincible?, A Lakhotia, A Kapoor, EU Kumar, Virus Bulletin 12, 57,  2004
  • Malware analysis and attribution using genetic information, A Pfeffer, C Call, J Chamberlain, L Kellogg, J Ouellette, T Patten, 2012 7th International Conference on Malicious and Unwanted Software, 39-45,  2012
  • Analysis and detection of computer viruses and worms: An annotated bibliography, PK Singh, A Lakhotia, ACM SIGPLAN Notices 37 (2), 29-35, 2002
  • Imposing order on program statements to assist anti-virus scanners, A Lakhotia, M Mohammed, 11th Working Conference on Reverse Engineering, 161-170, 2004

Conference Papers

  • P. Black, I. Gondal, P. Vamplew and A. Lakhotia, "Identifying Cross-Version Function Similarity Using Contextual Features," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 2020, pp. 810-817, doi: 10.1109/TrustCom50675.2020.00110. keywords: {Support vector machines;Privacy;Semantics;Machine learning;Feature extraction;Malware;Security;malware similarity;malware evolution;function similarity;binary similarity;Zeus malware;machine learning},
  • P. Black, I. Gondal, P. Vamplew and A. Lakhotia, "Evolved Similarity Techniques in Malware Analysis," 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 2019, pp. 404-410, doi: 10.1109/TrustCom/BigDataSE.2019.00061. keywords: {Malware;Semantics;Manuals;Registers;Reverse engineering;Databases;malware evolution, malware similarity, Zeus, binary similarity}
  • A. Arrott, A. Lakhotia, F. Leitold and C. LeDoux, "Cluster analysis for deobfuscation of malware variants during ransomware attacks," 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Glasgow, UK, 2018, pp. 1-9, doi: 10.1109/CyberSA.2018.8551432.
    keywords: {Sensitivity;Data analysis;Firewalls (computing);Decision making;Malware;Ransomware;Risk management}
  • A. Lakhotia and P. Black, "Mining malware secrets," 2017 12th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, PR, USA, 2017, pp. 11-18, doi: 10.1109/MALWARE.2017.8323952.
    keywords: {Malware;Semantics;Botnet;Servers;Registers;Decoding;Task analysis}
  • J. Ouellette, A. Pfeffer and A. Lakhotia, "Countering malware evolution using cloud-based learning," 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE), Fajardo, PR, USA, 2013, pp. 85-94, doi: 10.1109/MALWARE.2013.6703689.
    keywords: {Malware;Feature extraction;Semantics;Machine learning algorithms;Classification algorithms;Clustering algorithms;Software},
  • A. Pfeffer et al., "Malware Analysis and attribution using Genetic Information," 2012 7th International Conference on Malicious and Unwanted Software, Fajardo, PR, USA, 2012, pp. 39-45, doi: 10.1109/MALWARE.2012.6461006.
    keywords: {Malware;Semantics;Genetics;Reverse engineering;Software;Software algorithms;Clustering algorithms},
  • A. Walenstein and A. Lakhotia, "A transformation-based model of malware derivation," 2012 7th International Conference on Malicious and Unwanted Software, Fajardo, PR, USA, 2012, pp. 17-25, doi: 10.1109/MALWARE.2012.6461003.
    keywords: {Malware;Production;Phylogeny;Genomics;Bioinformatics;Software;malware;provenance;derivation;phylogeny;evolution;genome;polymorphism attribution}
  • A. Singh and A. Lakhotia, "Game-theoretic design of an information exchange model for detecting packed malware," 2011 6th International Conference on Malicious and Unwanted Software, Fajardo, PR, USA, 2011, pp. 1-7, doi: 10.1109/MALWARE.2011.6112319.
    keywords: {Malware;Software;Industries;Collaboration;Explosives;Games;Ethics}
  • M. R. Chouchane, A. Walenstein and A. Lakhotia, "Using Markov chains to filter machine-morphed variants of malicious programs," 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), Alexandria, VA, USA, 2008, pp. 77-84, doi: 10.1109/MALWARE.2008.4690861.
    keywords: {Filters;Frequency;Engines;Filtering;Transformers;Cryptography;Genetic mutations;Encoding;Testing;Approximation algorithms}
  • G. Seetharaman, A. Lakhotia and E. P. Blasch, "Unmanned vehicles come of age: The DARPA grand challenge," in Computer, vol. 39, no. 12, pp. 26-29, Dec. 2006, doi: 10.1109/MC.2006.447. keywords: {Remotely operated vehicles;Mobile robots;Vehicle driving;Navigation;Robot kinematics;History;Road safety;Road vehicles;Streaming media;Automatic control;Unmanned vehicles;Autonomous vehicles;DARPA Grand Challenge}\
  • A. Walenstein, R. Mathur, M. R. Chouchane and A. Lakhotia, "Normalizing Metamorphic Malware Using Term Rewriting," 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation, Philadelphia, PA, USA, 2006, pp. 75-84, doi: 10.1109/SCAM.2006.20.
    keywords: {Computer worms;Computer viruses;Casting;Pattern matching;Emulation;Manipulator dynamics;Conferences;Computer aided instruction;Data mining}
  • A. Lakhotia and E. U. Kumar, "Abstracting stack to detect obfuscated calls in binaries," Source Code Analysis and Manipulation, Fourth IEEE International Workshop on, Chicago, IL, USA, 2004, pp. 17-26, doi: 10.1109/SCAM.2004.2.
    keywords: {Programming profession;Performance analysis;Laboratories;Delay;Operating systems;Libraries;Binary codes;Protection}
  • A. Lakhotia and M. Mohammed, "Imposing order on program statements to assist anti-virus scanners," 11th Working Conference on Reverse Engineering, Delft, Netherlands, 2004, pp. 161-170, doi: 10.1109/WCRE.2004.24.
    keywords: {Computer viruses;Engines;Space technology;Computer hacking;Prototypes;Information technology;Reverse engineering}
  • A. Lakhotia and P. Pathak, "Virus analysis: techniques, tools, and research issues tutorial," 11th Working Conference on Reverse Engineering, Delft, Netherlands, 2004, pp. 2-, doi: 10.1109/WCRE.2004.44.
    keywords: {Reverse engineering;Laboratories;Collaboration;Computer viruses;Protocols;Hardware;Computer worms;Immune system;Proposals;Viruses (medical)}
  • A. Lakhotia, A. Walenstein and R. Koschke, "Second international workshop on detection of software clones," 10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings., Victoria, BC, Canada, 2003, pp. 368-368, doi: 10.1109/WCRE.2003.1287269.
  • A. Walenstein, N. Jyoti, Junwei Li, Yun Yang and A. Lakhotia, "Problems creating task-relevant clone detection reference data," 10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings., Victoria, BC, Canada, 2003, pp. 285-294, doi: 10.1109/WCRE.2003.1287259.
    keywords: {Cloning;Humans;Detectors;Software tools;Software systems;Reverse engineering;Laboratories;Computer science;Uncertainty;Software engineering}
  • P. K. Singh and A. Lakhotia, "Static verification of worm and virus behavior in binary executables using model checking," IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., West Point, NY, USA, 2003, pp. 298-300, doi: 10.1109/SMCSIA.2003.1232440.
    keywords: {Computer worms;Mechanical factors;LAN interconnection;Security;Computer viruses;Biological information theory;Biology computing;Application software;Encoding;Flow graphs}
  • A. Lakhotia, Junwei Li, A. Walenstein and Yun Yang, "Towards a clone detection benchmark suite and results archive," 11th IEEE International Workshop on Program Comprehension, 2003., Portland, OR, USA, 2003, pp. 285-286, doi: 10.1109/WPC.2003.1199215.
    keywords: {Cloning;Benchmark testing;Infrared detectors;Software testing;System testing;Software systems;Laboratories;Computer science;Buildings;Research and development}
  • J. . -C. Deprez and A. Lakhotia, "A formalism to automate mapping from program features to code," Proceedings IWPC 2000. 8th International Workshop on Program Comprehension, Limerick, Ireland, 2000, pp. 69-78, doi: 10.1109/WPC.2000.852481.
    keywords: {Software fault diagnosis}
  • A. Lakhotia and J. . -C. Deprez, "Restructuring functions with low cohesion," Sixth Working Conference on Reverse Engineering (Cat. No.PR00303), Atlanta, GA, USA, 1999, pp. 36-46, doi: 10.1109/WCRE.1999.806945.
    keywords: {Software systems;Computer industry;Reverse engineering;Computer architecture;Programming profession;Data processing;Algorithms;Environmental management}
  • A. Lakhotia, "DIME: a direct manipulation environment for evolutionary software development," Proceedings. 6th International Workshop on Program Comprehension. IWPC'98 (Cat. No.98TB100242), Ischia, Italy, 1998, pp. 72-79, doi: 10.1109/WPC.1998.693289.
    keywords: {Programming profession;Software systems;Mice;Underwater vehicles;Computer architecture;Electronic components;User interfaces;Software performance;Technological innovation;Joining processes}
  • J. M. Gravley and A. Lakhotia, "Identifying enumeration types modeled with symbolic constants," Proceedings of WCRE '96: 4rd Working Conference on Reverse Engineering, Monterey, CA, USA, 1996, pp. 227-236, doi: 10.1109/WCRE.1996.558915.
    keywords: {Encapsulation;Software systems;Distributed computing;Computer languages;Government;Terminology;Interleaved codes;Computer architecture;Performance evaluation;Programming profession}
  • A. Lakhotia and J. M. Gravley, "Toward experimental evaluation of subsystem classification recovery techniques," Proceedings of 2nd Working Conference on Reverse Engineering, Toronto, ON, Canada, 1995, pp. 262-269, doi: 10.1109/WCRE.1995.514714.
    keywords: {Size control;Control systems;Testing;Software systems;Reverse engineering;Software measurement;Terminology;Geoscience;Pattern recognition;Information retrieval}
  • A. Lakhotia, "Rule-based approach to computing module cohesion," Proceedings of 1993 15th International Conference on Software Engineering, Baltimore, MD, USA, 1993, pp. 35-44, doi: 10.1109/ICSE.1993.346057.
    keywords: {Software quality;Marine vehicles;Process design;Maintenance;Software testing;Software systems;Laboratories}

Magazine Article

  • G. Seetharaman, A. Lakhotia and E. P. Blasch, "Unmanned vehicles come of age: The DARPA grand challenge," in Computer, vol. 39, no. 12, pp. 26-29, Dec. 2006, doi: 10.1109/MC.2006.447. keywords: {Remotely operated vehicles;Mobile robots;Vehicle driving;Navigation;Robot kinematics;History;Road safety;Road vehicles;Streaming media;Automatic control;Unmanned vehicles;Autonomous vehicles;DARPA Grand Challenge}

Conferences

  • Dalla Preda, M., Feng, W., Giacobazzi, R., Greechie, R., & Lakhotia, A. (2012). Twisting Additivity in Program Obfuscation. In S. Dua, A. Gangopadhyay, P. Thulasiraman, U. Straccia, M. Shepherd, & B. Stein (Eds.), Information Systems, Technology and Management (pp. 336–347). Springer Berlin Heidelberg. Retrieved from http://link.springer.com/chapter/10.1007/978-3-642-29166-1_30 Cite
  • Singh, P. K., Moinuddin, M., & Lakhotia, A. (2003). Using static analysis and verification for analyzing virus and worm programs. In Proceedings of the 2nd European Conference on Information Warfare and Security (pp. 281–292). Cite
  • Lakhotia, A. (1998). DIME: a direct manipulation environment for evolutionary development of software. In , 6th International Workshop on Program Comprehension, 1998. IWPC ’98. Proceedings (pp. 72–79). https://doi.org/10.1109/WPC.1998.693289
  • Harman, M., Lakhotia, A., & Binkley, D. W. (2006). A Framework for Static Slicers of Unstructured Programs. Information and Software Technology, 48(7), 549–565. Retrieved from http://calcium.dcs.kcl.ac.uk/329/
  • Lakhotia, A. (1993). Rule-based approach to computing module cohesion. In , 15th International Conference on Software Engineering, 1993. Proceedings (pp. 35–44). https://doi.org/10.1109/ICSE.1993.346057 
  • Lakhotia, A., & Deprez, J.-C. (1999). Restructuring functions with low cohesion. In Sixth Working Conference on Reverse Engineering, 1999. Proceedings (pp. 36–46). https://doi.org/10.1109/WCRE.1999.806945 
  • Lakhotia, A. (1993). Constructing Call Multigraphs Using Dependence Graphs. In Proceedings of the 20th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (pp. 273–284). New York, NY, USA: ACM. https://doi.org/10.1145/158511.158647 
  • Karim, M. E., Walenstein, A., Lakhotia, A., & Parida, L. (2005). Malware phylogeny using maximal pi-patterns. In EICAR 2005 Conference: Best Paper Proceedings (pp. 156–174). Retrieved from http://www.researchgate.net/publication/228640414_Malware_Phylogeny_Usin...