2008 |
41 | | Kemal Efe,
Alp V. Asutay,
Arun Lakhotia:
A User Interface for Exploiting Web Communities in Searching the Web.
WEBIST (2) 2008: 114-121 |
40 | EE | Andrew Walenstein,
Rachit Mathur,
Mohamed R. Chouchane,
Arun Lakhotia:
Constructing malware normalizers using term rewriting.
Journal in Computer Virology 4(4): 307-322 (2008) |
2006 |
39 | EE | Andrew Walenstein,
Arun Lakhotia:
The Software Similarity Problem in Malware Analysis.
Duplication, Redundancy, and Similarity in Software 2006 |
38 | EE | Md. Enamul Karim,
Laxmi Parida,
Arun Lakhotia:
Using Permutation Patterns for Content-Based Phylogeny.
PRIB 2006: 115-125 |
37 | EE | Andrew Walenstein,
Rachit Mathur,
Mohamed R. Chouchane,
Arun Lakhotia:
Normalizing Metamorphic Malware Using Term Rewriting.
SCAM 2006: 75-84 |
36 | EE | Mohamed R. Chouchane,
Arun Lakhotia:
Using engine signature to detect metamorphic malware.
WORM 2006: 73-78 |
35 | EE | Guna Seetharaman,
Arun Lakhotia,
Erik Philip Blasch:
Unmanned Vehicles Come of Age: The DARPA Grand Challenge.
IEEE Computer 39(12): 26-29 (2006) |
34 | EE | Mark Harman,
Arun Lakhotia,
David Binkley:
Theory and algorithms for slicing unstructured programs.
Information & Software Technology 48(7): 549-565 (2006) |
33 | EE | Arun Lakhotia,
Suresh Golconda,
Anthony Maida,
Pablo Mejia,
Amit Puntambeker,
Guna Seetharaman,
Scott Wilson:
CajunBot: Architecture and algorithms.
J. Field Robotics 23(8): 555-578 (2006) |
2005 |
32 | EE | Michael Venable,
Mohamed R. Chouchane,
Md. Enamul Karim,
Arun Lakhotia:
Analyzing Memory Accesses in Obfuscated x86 Executables.
DIMVA 2005: 1-18 |
31 | EE | Arun Lakhotia,
Eric Uday Kumar,
Michael Venable:
A Method for Detecting Obfuscated Calls in Malicious Binaries.
IEEE Trans. Software Eng. 31(11): 955-968 (2005) |
30 | EE | Md. Enamul Karim,
Andrew Walenstein,
Arun Lakhotia,
Laxmi Parida:
Malware phylogeny generation using permutations of code.
Journal in Computer Virology 1(1-2): 13-23 (2005) |
2004 |
29 | EE | Arun Lakhotia,
Eric Uday Kumar:
Abstracting Stack to Detect Obfuscated Calls in Binaries.
SCAM 2004: 17-26 |
28 | EE | Arun Lakhotia,
Moinuddin Mohammed:
Imposing Order on Program Statements to Assist Anti-Virus Scanners.
WCRE 2004: 161-170 |
27 | EE | Arun Lakhotia,
Prashant Pathak:
Virus Analysis: Techniques, Tools, and Research Issues.
WCRE 2004: 2 |
26 | EE | Andrew Walenstein,
Arun Lakhotia,
Rainer Koschke:
The Second International Workshop on Detection of Software Clones: workshop report.
ACM SIGSOFT Software Engineering Notes 29(2): 1-5 (2004) |
2003 |
25 | | Prabhat K. Singh,
Arun Lakhotia:
Static Verification of Worm and virus Behavior in binary Executables using Model Checking.
IAW 2003: 298-300 |
24 | EE | Arun Lakhotia,
Junwei Li,
Andrew Walenstein,
Yun Yang:
Towards a Clone Detection Benchmark Suite and Results Archive.
IWPC 2003: 285- |
23 | EE | Andrew Walenstein,
Nitin Jyoti,
Junwei Li,
Yun Yang,
Arun Lakhotia:
Problems Creating Task-relevant Clone Detection Reference Data.
WCRE 2003: 285-295 |
22 | EE | Arun Lakhotia,
Andrew Walenstein,
Rainer Koschke:
Second International Workshop on Detection of Software Clones.
WCRE 2003: 368 |
2002 |
21 | | Prabhat K. Singh,
Arun Lakhotia:
Analysis and Detection of Computer Viruses and Worms: An Annotated Bibliography.
SIGPLAN Notices 37(2): 29-35 (2002) |
2000 |
20 | EE | Jean-Christophe Deprez,
Arun Lakhotia:
A Formalism to Automate Mapping from Program Features to Code.
IWPC 2000: 69-78 |
1999 |
19 | EE | Arun Lakhotia,
Jean-Christophe Deprez:
Restructuring Functions with Low Cohesion.
WCRE 1999: 36-46 |
18 | EE | Jagadeesh Nandigam,
Arun Lakhotia,
Claude G. Cech:
Experimental Evaluation of Agreement among Programmers in Applying the Rules of Cohesion.
Journal of Software Maintenance 11(1): 35-53 (1999) |
1998 |
17 | EE | Arun Lakhotia:
DIME: A Direct Manipulation Environment for Evolutionary Development of Software.
IWPC 1998: 72- |
16 | EE | Arun Lakhotia,
Jean-Christophe Deprez:
Restructuring programs by tucking statements into functions.
Information & Software Technology 40(11-12): 677-689 (1998) |
15 | EE | Tat W. Chan,
Arun Lakhotia:
Debugging program failure exhibited by voluminous data.
Journal of Software Maintenance 10(2): 111-150 (1998) |
1997 |
14 | | Arun Lakhotia:
A Unified Framework For Expressing Software Subsystem Classification Techniques.
Journal of Systems and Software 36(3): 211-231 (1997) |
1996 |
13 | EE | John M. Gravley,
Arun Lakhotia:
Identifying Enumeration Types Modeled with Symbolic Constants.
WCRE 1996: 227- |
1995 |
12 | | Arun Lakhotia,
John M. Gravley:
Toward Experimental Evaluation of Subsystem Classification Recovery Techniques.
WCRE 1995: 262-269 |
1994 |
11 | EE | Jianxin Li,
Arun Lakhotia:
Using Mathematical Induction in Systematic Program Development.
International Journal of Software Engineering and Knowledge Engineering 4(4): 561-574 (1994) |
1993 |
10 | EE | Arun Lakhotia:
Rule-Based Approach to Computing Module Cohesion.
ICSE 1993: 35-44 |
9 | | Arun Lakhotia:
Constructing Call Multigraphs Using Dependence Graphs.
POPL 1993: 273-284 |
8 | EE | Arun Lakhotia:
Understanding someone else's code: Analysis of experiences.
Journal of Systems and Software 23(3): 269-275 (1993) |
1992 |
7 | EE | Arun Lakhotia:
Book Review: "software Engineering: a Holistic View".
International Journal of Software Engineering and Knowledge Engineering 2(3): 483-486 (1992) |
1990 |
6 | | Arun Lakhotia,
Leon Sterling:
Program Development by Stepwise 'Enhancement'.
SEKE 1990: 78-83 |
5 | | Arun Lakhotia,
Leon Sterling:
How to Control Unfolding when Specializing Interpreters.
New Generation Comput. 8(1): 61-70 (1990) |
1989 |
4 | | Arun Lakhotia:
Incorporating `Programming Techniques' into Prolog Programs.
NACLP 1989: 426-440 |
1988 |
3 | | Leon Sterling,
Arun Lakhotia:
Composing Prolog Meta-Interpreters.
ICLP/SLP 1988: 386-403 |
2 | | Arun Lakhotia,
Leon Sterling:
Composing Recursive Logic Programs with Clausal Join.
New Generation Comput. 6(2&3): 211-225 (1988) |
1985 |
1 | | Arun Lakhotia:
Implication and Equivalence I/O.
Operating Systems Review 19(1): 46-52 (1985) |