| 2008 |
| 41 | | Kemal Efe,
Alp V. Asutay,
Arun Lakhotia:
A User Interface for Exploiting Web Communities in Searching the Web.
WEBIST (2) 2008: 114-121 |
| 40 | EE | Andrew Walenstein,
Rachit Mathur,
Mohamed R. Chouchane,
Arun Lakhotia:
Constructing malware normalizers using term rewriting.
Journal in Computer Virology 4(4): 307-322 (2008) |
| 2006 |
| 39 | EE | Andrew Walenstein,
Arun Lakhotia:
The Software Similarity Problem in Malware Analysis.
Duplication, Redundancy, and Similarity in Software 2006 |
| 38 | EE | Md. Enamul Karim,
Laxmi Parida,
Arun Lakhotia:
Using Permutation Patterns for Content-Based Phylogeny.
PRIB 2006: 115-125 |
| 37 | EE | Andrew Walenstein,
Rachit Mathur,
Mohamed R. Chouchane,
Arun Lakhotia:
Normalizing Metamorphic Malware Using Term Rewriting.
SCAM 2006: 75-84 |
| 36 | EE | Mohamed R. Chouchane,
Arun Lakhotia:
Using engine signature to detect metamorphic malware.
WORM 2006: 73-78 |
| 35 | EE | Guna Seetharaman,
Arun Lakhotia,
Erik Philip Blasch:
Unmanned Vehicles Come of Age: The DARPA Grand Challenge.
IEEE Computer 39(12): 26-29 (2006) |
| 34 | EE | Mark Harman,
Arun Lakhotia,
David Binkley:
Theory and algorithms for slicing unstructured programs.
Information & Software Technology 48(7): 549-565 (2006) |
| 33 | EE | Arun Lakhotia,
Suresh Golconda,
Anthony Maida,
Pablo Mejia,
Amit Puntambeker,
Guna Seetharaman,
Scott Wilson:
CajunBot: Architecture and algorithms.
J. Field Robotics 23(8): 555-578 (2006) |
| 2005 |
| 32 | EE | Michael Venable,
Mohamed R. Chouchane,
Md. Enamul Karim,
Arun Lakhotia:
Analyzing Memory Accesses in Obfuscated x86 Executables.
DIMVA 2005: 1-18 |
| 31 | EE | Arun Lakhotia,
Eric Uday Kumar,
Michael Venable:
A Method for Detecting Obfuscated Calls in Malicious Binaries.
IEEE Trans. Software Eng. 31(11): 955-968 (2005) |
| 30 | EE | Md. Enamul Karim,
Andrew Walenstein,
Arun Lakhotia,
Laxmi Parida:
Malware phylogeny generation using permutations of code.
Journal in Computer Virology 1(1-2): 13-23 (2005) |
| 2004 |
| 29 | EE | Arun Lakhotia,
Eric Uday Kumar:
Abstracting Stack to Detect Obfuscated Calls in Binaries.
SCAM 2004: 17-26 |
| 28 | EE | Arun Lakhotia,
Moinuddin Mohammed:
Imposing Order on Program Statements to Assist Anti-Virus Scanners.
WCRE 2004: 161-170 |
| 27 | EE | Arun Lakhotia,
Prashant Pathak:
Virus Analysis: Techniques, Tools, and Research Issues.
WCRE 2004: 2 |
| 26 | EE | Andrew Walenstein,
Arun Lakhotia,
Rainer Koschke:
The Second International Workshop on Detection of Software Clones: workshop report.
ACM SIGSOFT Software Engineering Notes 29(2): 1-5 (2004) |
| 2003 |
| 25 | | Prabhat K. Singh,
Arun Lakhotia:
Static Verification of Worm and virus Behavior in binary Executables using Model Checking.
IAW 2003: 298-300 |
| 24 | EE | Arun Lakhotia,
Junwei Li,
Andrew Walenstein,
Yun Yang:
Towards a Clone Detection Benchmark Suite and Results Archive.
IWPC 2003: 285- |
| 23 | EE | Andrew Walenstein,
Nitin Jyoti,
Junwei Li,
Yun Yang,
Arun Lakhotia:
Problems Creating Task-relevant Clone Detection Reference Data.
WCRE 2003: 285-295 |
| 22 | EE | Arun Lakhotia,
Andrew Walenstein,
Rainer Koschke:
Second International Workshop on Detection of Software Clones.
WCRE 2003: 368 |
| 2002 |
| 21 | | Prabhat K. Singh,
Arun Lakhotia:
Analysis and Detection of Computer Viruses and Worms: An Annotated Bibliography.
SIGPLAN Notices 37(2): 29-35 (2002) |
| 2000 |
| 20 | EE | Jean-Christophe Deprez,
Arun Lakhotia:
A Formalism to Automate Mapping from Program Features to Code.
IWPC 2000: 69-78 |
| 1999 |
| 19 | EE | Arun Lakhotia,
Jean-Christophe Deprez:
Restructuring Functions with Low Cohesion.
WCRE 1999: 36-46 |
| 18 | EE | Jagadeesh Nandigam,
Arun Lakhotia,
Claude G. Cech:
Experimental Evaluation of Agreement among Programmers in Applying the Rules of Cohesion.
Journal of Software Maintenance 11(1): 35-53 (1999) |
| 1998 |
| 17 | EE | Arun Lakhotia:
DIME: A Direct Manipulation Environment for Evolutionary Development of Software.
IWPC 1998: 72- |
| 16 | EE | Arun Lakhotia,
Jean-Christophe Deprez:
Restructuring programs by tucking statements into functions.
Information & Software Technology 40(11-12): 677-689 (1998) |
| 15 | EE | Tat W. Chan,
Arun Lakhotia:
Debugging program failure exhibited by voluminous data.
Journal of Software Maintenance 10(2): 111-150 (1998) |
| 1997 |
| 14 | | Arun Lakhotia:
A Unified Framework For Expressing Software Subsystem Classification Techniques.
Journal of Systems and Software 36(3): 211-231 (1997) |
| 1996 |
| 13 | EE | John M. Gravley,
Arun Lakhotia:
Identifying Enumeration Types Modeled with Symbolic Constants.
WCRE 1996: 227- |
| 1995 |
| 12 | | Arun Lakhotia,
John M. Gravley:
Toward Experimental Evaluation of Subsystem Classification Recovery Techniques.
WCRE 1995: 262-269 |
| 1994 |
| 11 | EE | Jianxin Li,
Arun Lakhotia:
Using Mathematical Induction in Systematic Program Development.
International Journal of Software Engineering and Knowledge Engineering 4(4): 561-574 (1994) |
| 1993 |
| 10 | EE | Arun Lakhotia:
Rule-Based Approach to Computing Module Cohesion.
ICSE 1993: 35-44 |
| 9 | | Arun Lakhotia:
Constructing Call Multigraphs Using Dependence Graphs.
POPL 1993: 273-284 |
| 8 | EE | Arun Lakhotia:
Understanding someone else's code: Analysis of experiences.
Journal of Systems and Software 23(3): 269-275 (1993) |
| 1992 |
| 7 | EE | Arun Lakhotia:
Book Review: "software Engineering: a Holistic View".
International Journal of Software Engineering and Knowledge Engineering 2(3): 483-486 (1992) |
| 1990 |
| 6 | | Arun Lakhotia,
Leon Sterling:
Program Development by Stepwise 'Enhancement'.
SEKE 1990: 78-83 |
| 5 | | Arun Lakhotia,
Leon Sterling:
How to Control Unfolding when Specializing Interpreters.
New Generation Comput. 8(1): 61-70 (1990) |
| 1989 |
| 4 | | Arun Lakhotia:
Incorporating `Programming Techniques' into Prolog Programs.
NACLP 1989: 426-440 |
| 1988 |
| 3 | | Leon Sterling,
Arun Lakhotia:
Composing Prolog Meta-Interpreters.
ICLP/SLP 1988: 386-403 |
| 2 | | Arun Lakhotia,
Leon Sterling:
Composing Recursive Logic Programs with Clausal Join.
New Generation Comput. 6(2&3): 211-225 (1988) |
| 1985 |
| 1 | | Arun Lakhotia:
Implication and Equivalence I/O.
Operating Systems Review 19(1): 46-52 (1985) |