The SCEAS System
Navigation Menu

Search the dblp DataBase


Arun Lakhotia: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia
    Analyzing Memory Accesses in Obfuscated x86 Executables. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:1-18 [Conf]
  2. Prabhat K. Singh, Arun Lakhotia
    Static Verification of Worm and virus Behavior in binary Executables using Model Checking. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:298-300 [Conf]
  3. Leon Sterling, Arun Lakhotia
    Composing Prolog Meta-Interpreters. [Citation Graph (0, 0)][DBLP]
    ICLP/SLP, 1988, pp:386-403 [Conf]
  4. Arun Lakhotia
    Rule-Based Approach to Computing Module Cohesion. [Citation Graph (0, 0)][DBLP]
    ICSE, 1993, pp:35-44 [Conf]
  5. Jean-Christophe Deprez, Arun Lakhotia
    A Formalism to Automate Mapping from Program Features to Code. [Citation Graph (0, 0)][DBLP]
    IWPC, 2000, pp:69-78 [Conf]
  6. Arun Lakhotia
    DIME: A Direct Manipulation Environment for Evolutionary Development of Software. [Citation Graph (0, 0)][DBLP]
    IWPC, 1998, pp:72-0 [Conf]
  7. Arun Lakhotia, Junwei Li, Andrew Walenstein, Yun Yang
    Towards a Clone Detection Benchmark Suite and Results Archive. [Citation Graph (0, 0)][DBLP]
    IWPC, 2003, pp:285-0 [Conf]
  8. Arun Lakhotia
    Constructing Call Multigraphs Using Dependence Graphs. [Citation Graph (0, 0)][DBLP]
    POPL, 1993, pp:273-284 [Conf]
  9. Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia
    Normalizing Metamorphic Malware Using Term Rewriting. [Citation Graph (0, 0)][DBLP]
    SCAM, 2006, pp:75-84 [Conf]
  10. Arun Lakhotia, Eric Uday Kumar
    Abstracting Stack to Detect Obfuscated Calls in Binaries. [Citation Graph (0, 0)][DBLP]
    SCAM, 2004, pp:17-26 [Conf]
  11. Arun Lakhotia, Leon Sterling
    Program Development by Stepwise 'Enhancement'. [Citation Graph (0, 0)][DBLP]
    SEKE, 1990, pp:78-83 [Conf]
  12. Arun Lakhotia
    Incorporating `Programming Techniques' into Prolog Programs. [Citation Graph (0, 0)][DBLP]
    NACLP, 1989, pp:426-440 [Conf]
  13. John M. Gravley, Arun Lakhotia
    Identifying Enumeration Types Modeled with Symbolic Constants. [Citation Graph (0, 0)][DBLP]
    WCRE, 1996, pp:227-0 [Conf]
  14. Arun Lakhotia, Jean-Christophe Deprez
    Restructuring Functions with Low Cohesion. [Citation Graph (0, 0)][DBLP]
    WCRE, 1999, pp:36-46 [Conf]
  15. Arun Lakhotia, John M. Gravley
    Toward Experimental Evaluation of Subsystem Classification Recovery Techniques. [Citation Graph (0, 0)][DBLP]
    WCRE, 1995, pp:262-269 [Conf]
  16. Arun Lakhotia, Moinuddin Mohammed
    Imposing Order on Program Statements to Assist Anti-Virus Scanners. [Citation Graph (0, 0)][DBLP]
    WCRE, 2004, pp:161-170 [Conf]
  17. Arun Lakhotia, Prashant Pathak
    Virus Analysis: Techniques, Tools, and Research Issues. [Citation Graph (0, 0)][DBLP]
    WCRE, 2004, pp:2- [Conf]
  18. Arun Lakhotia, Andrew Walenstein, Rainer Koschke
    Second International Workshop on Detection of Software Clones. [Citation Graph (0, 0)][DBLP]
    WCRE, 2003, pp:368- [Conf]
  19. Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yang, Arun Lakhotia
    Problems Creating Task-relevant Clone Detection Reference Data. [Citation Graph (0, 0)][DBLP]
    WCRE, 2003, pp:285-295 [Conf]
  20. Md. Enamul Karim, Laxmi Parida, Arun Lakhotia
    Using Permutation Patterns for Content-Based Phylogeny. [Citation Graph (0, 0)][DBLP]
    PRIB, 2006, pp:115-125 [Conf]
  21. Mohamed R. Chouchane, Arun Lakhotia
    Using engine signature to detect metamorphic malware. [Citation Graph (0, 0)][DBLP]
    WORM, 2006, pp:73-78 [Conf]
  22. Mark Harman, Arun Lakhotia, David Binkley
    Theory and algorithms for slicing unstructured programs. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:549-565 [Journal]
  23. Arun Lakhotia, Jean-Christophe Deprez
    Restructuring programs by tucking statements into functions. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 1998, v:40, n:11-12, pp:677-689 [Journal]
  24. Arun Lakhotia
    Understanding someone else's code: Analysis of experiences. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1993, v:23, n:3, pp:269-275 [Journal]
  25. Arun Lakhotia
    A Unified Framework For Expressing Software Subsystem Classification Techniques. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1997, v:36, n:3, pp:211-231 [Journal]
  26. Arun Lakhotia, Leon Sterling
    Composing Recursive Logic Programs with Clausal Join. [Citation Graph (0, 0)][DBLP]
    New Generation Comput., 1988, v:6, n:2&3, pp:211-225 [Journal]
  27. Arun Lakhotia, Leon Sterling
    How to Control Unfolding when Specializing Interpreters. [Citation Graph (0, 0)][DBLP]
    New Generation Comput., 1990, v:8, n:1, pp:61-70 [Journal]
  28. Arun Lakhotia
    Implication and Equivalence I/O. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1985, v:19, n:1, pp:46-52 [Journal]
  29. Prabhat K. Singh, Arun Lakhotia
    Analysis and Detection of Computer Viruses and Worms: An Annotated Bibliography. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 2002, v:37, n:2, pp:29-35 [Journal]
  30. Jagadeesh Nandigam, Arun Lakhotia, Claude G. Cech
    Experimental Evaluation of Agreement among Programmers in Applying the Rules of Cohesion. [Citation Graph (0, 0)][DBLP]
    Journal of Software Maintenance, 1999, v:11, n:1, pp:35-53 [Journal]
  31. Tat W. Chan, Arun Lakhotia
    Debugging program failure exhibited by voluminous data. [Citation Graph (0, 0)][DBLP]
    Journal of Software Maintenance, 1998, v:10, n:2, pp:111-150 [Journal]
  32. Arun Lakhotia, Eric Uday Kumar, Michael Venable
    A Method for Detecting Obfuscated Calls in Malicious Binaries. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2005, v:31, n:11, pp:955-968 [Journal]
  33. Md. Enamul Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida
    Malware phylogeny generation using permutations of code. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2005, v:1, n:1-2, pp:13-23 [Journal]

  34. The Software Similarity Problem in Malware Analysis. [Citation Graph (, )][DBLP]

  35. Context-sensitive analysis of obfuscated x86 executables. [Citation Graph (, )][DBLP]

  36. A User Interface for Exploiting Web Communities in Searching the Web. [Citation Graph (, )][DBLP]

  37. Unmanned Vehicles Come of Age: The DARPA Grand Challenge. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.008secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002