BIOGRAPHICAL SKETCH

ARUN LAKHOTIA Center for Advanced Computer Studies University of at Lafayette, Lafayette, LA [email protected]

RESEARCH INTERESTS

• Cyber Security: Malware Analysis • Autonomous Vehicles EDUCATION • Ph.D., Computer Science, Case Western Reserve University, Cleveland, OH, USA (1990) • M.Sc. (Tech.) Computer Science, Birla Institute of Technology and Science, Pilani, India (1982) EMPLOYMENT HISTORY • 8/06 – till, Professor, University of Louisiana at Lafayette, Lafayette, LA • 7/09 – till, Adjunct Professor, Birla Institute of Technology and Science, Pilani, India • 8/96 – 8/06, Associate Professor, University of Louisiana at Lafayette, Lafayette, LA • 8/89 - 8/96, Assistant Professor, University of Louisiana at Lafayette, Lafayette, LA • 8/85 - 8/89, Research Assistant, Case Western Reserve University, Cleveland, OH • Summers 86, 87, 88, Summer Development Student, Computer Science Center, Texas Instruments, Dallas, TX • 3/84 - 7/85, Project Leader, Madras Computers Laboratories, Madras, India • 2/83 - 2/84, Software Engineer, Zenith Computer Systems, Ltd., Bombay, India • 1/82 - 5/82, Teaching Assistant, Birla Institute of Technology and Science, Pilani, India SCIENTIFIC CONSULTING • Expert Consultant, Hawkins and Garbin, LLC, Lafayette, LA • Co-Member, Evidence Management Systems, LLC, • Co-Founder, OnlineCSR.Com • Consultant and Technical Project Manager, Med-Data Management, Inc. • Expert Consultant, Lamothe & Hamilton Law Firm • Advisor, The Solution Set, Inc., Lafayette, LA • Consulting Scientist, SICOR Consortium, • President & CEO, Lakhotia Software, Inc. (www.lakhotia-software.com) RECOGNITIONS AND AWARDS • CajunBot-II semi-finalist in 2007 DARPA Urban Challenge • Lockheed Martin Corporation BORSF Professor • CajunBot ranked 15 out of 23 finalists in the 2005 DARPA Grand Challenge.

Lakhotia/CV Page 1 July 30, 2013 • Louisiana Governor’s 2004 University Technology Leader of the Year . • Louisiana Governor Kathleen Blanco proclaimed June 2, 2004 as CajunBot Day, in recognition of the achievements of Team CajunBot, led by me. • Louisiana House of Representative passed House Resolution 87, Regular Session, 2004 to “express enduring gratitude for the pride and honor” brought by Team CajunBot to the State of Louisiana. • CajunBot amongst 13 finalists in the 2004 DARPA Grand Challenge. • CACS Oustanding Undergraduate Teaching Award (2000) • Outstanding Teacher Award, by CACS Student-Teacher-Alumni Association (1995) EXPERT WITNESS • April - May, 2003. Expert for plaintiff in Ogwyn Enterprises, Inc. v Fraze, et al., Attorney: Mr. Scott M. Hawkins, Hawkins & Garbin, LLC. • July – December 1999. Expert for MedLink Development, L.L.C. et al.vs. MedLink Systems, L.L.C. et al., and Med Data Software Solutions, L.L.C. et al., No. 99-1994 (K) (2). Attorney: Mr. Kirk Reasonover, Lamothe & Hamilton, LLC, New Orleans.

RESEARCH GRANTS • Co-PI, AFOSR, Semi-Supervised Algorithms against Malware Evolution – Phase II (SESAME), STTR 2011 program. Subcontract through Charles Rivers Analytics, (Total UL: $300,000, UL Indirect Cost: $169,000; Total Project: $750,000) , 3/13-4/15 • Co-PI, AFOSR, Semi-Supervised Algorithms against Malware Evolution – Phase I (SESAME), STTR 2011 program. Subcontract through Charles Rivers Analytics, (Total UL: $40,000, UL Indirect Cost: $12,028; Total Project: $100,000), 3/12-9/12 • Co-PI, ARO, “Cloud-based Autonomous Real-time Malware Analysis (CARMA).” STTR 2011 program. Subcontract through Charles Rivers Analytics, Total UL Budget: $40,000, UL Indirect Cost: $12,028; Total Project $100,000, 6/11-3/12. • Co-PI, DARPA, “MAAGI – Malware Analysis and Attribution using Genetic Information,” subcontract amount $1,001,441, 09/10-09/14. • Lead-PI, Air Force Office of Scientific Research, “Obfuscation and Deobfuscation of Intent of Computer Programs,” $789,989, 09/09-09/12. • Co-PI, United States Department of the Interior, “Technical assistant for tabular and spatial data management, analysis, dissemination, and visualization for CWPPRA and CERP,” $230,334, 08/08-08/10. • PI, University of Louisiana at Lafayette, “Autonomous Ground Vehicles,” About $350k/year, 07/05-06/07. • PI, University of Louisiana at Lafayette, “Commercializing Next-Generation Anti-Virus Technologies,” About $320K per year, 07/05-06/07. • PI, University of Louisiana at Lafayette, “CajunBot: Autonomous Vehicle,” $250,000, 01/04-11/05. • PI, State of Louisiana, “Technology for Resolving Copyright Disputes,” $500,000, 8/01- 8/05. • PI, State of Louisiana, “Technology for Detecting Computer Viruses and Worms,” $700,000, 8/01-8/05.

Lakhotia/CV Page 2 July 30, 2013 • PI, DoD (IDEA Program), “Restructuring Complex Program Fragments into Smaller Cohesive Units,” In collaboration with Leverage Technologists, MD, 1/96-12/96, ($153K) • PI, LEQSF (BOR match to DEPSCoR awardees), “Fostering Research on Software Reengineering in Louisiana,” 1/96-12/96, ($51K). • PI, ARPA (DEPSCoR program), “Identifying Objects in Legacy Systems for Reuse and Re- Engineering,” 8/94 - 12/98, ($258K). • PI, LEQSF (Research Competitiveness Subprogram), “Recovering Dataflow Design of Software Systems from Source Code,” 6/93 - 5/95, ($66K) • Lead PI, LEQSF (Equipment grant), “Facilities for Advanced Studies of Architectures of Large Software Systems,” Co-PIs: Williams Edwards, Dennis Moreau 6/92 - 5/93, ($106K) • PI, USL (Summer research award), “Study of Architectures Of Large Software Systems,” 6/92 - 8/92, $4K

PRESENTATIONS Excluding presentations of published works.

01/13 “Fast location of similar code fragments using semantic ‘juice’”. Program Protection and Reverse Engineering Workshop, Rome, Italy. 11/12 “Android Malware – Not just an old win in new bottle”, Keynote speaker. Third Workshop on Application and Techniques in Information Security, Melbourne, Australia. 12/08 “Autonomous Vehicles.” Invited talk, Amrita College of Engineering, Amritapuri, Kerala, India. 10/06 “Computer Virus: Theory and Practice,” Keynote speaker, Scientific ICT Research Netherlands (SIREN2006), Utrecht, The Netherlands. 04/06 “A Method for Detecting Obfuscated Calls in Malicious Binaries,” Invited speaker, The Sixth Astrenet Workshop: Source Code Analysis and Manipulation for Security, , UK. 01/06 “Analysis of Adversarial Code: Problem, Challenges, Results,” BlackHat Federal Show 2006, Crystal City, Alexandria, Virginia. 11/05 “Analysis of Adversarial Code: Problem, Challenges, Results,” Washington Area Trustworthy Systems Hour, National Science Foundation. 06/05 “Hardened Analysis: Battling Malicious Code,” Symantec Corporation, Santa Monica, CA. 02/05 Banquet Speaker, MATHCOUNTS Award Banquet, Louisiana Engineering Society 11/04 “Virus Analysis: Tools, Techniques, and Research Issues,” a half-day tutorial presented in Technical University, Delft, during the IEEE Working Conference on Reverse Engineering, 2004. 08/04 “CajunBot: Research Challenges”, Birla Institute of Technology and Science, Pilani, India. 08/02 “U.S. Copyright Laws,” at Momentum India Pvt. Ltd., NOIDA, India. 11/02 “Intellectual Property: And the Nerd’s Rule,” to Lafayette Junior Leadership: Education and Technology Day. 12/02 “Secure Communications”, FBI Infragard Lafayette Chapter.

PUBLICATIONS

REFEREED JOURNALS

Lakhotia/CV Page 3 July 30, 2013

1. Radhouane Chouchane, Natalia Stakhanova, AndrewWalenstein, Arun Lakhotia, Detecting Machine-Morphed Malware Variants via Engine Attribution. Journal in Computer Virology . Springer , to appear. 2. Craig Miles, Arun Lakhotia, and Andrew Walenstein. In Situ Reuse of Logically Extracted Functional Components. Journal in Computer Virology . Springer Paris, 8 (3): 73-84. DOI: 10.1007/s11416-012-0167-y. 3. Kemal Efe, Alp V. Asutay, Arun Lakhotia: Exploring Web Neighbours in Exploratory Search. IJWIS 7(2): 152-182 (2011). 4. Arun Lakhotia, Davidson R. Boccardo, Anshuman Singh, Aleardo Manacero Jr.: Context- sensitive analysis without calling-context. Higher-Order and Symbolic Computation 23 (3): 275-313 (2010). 5. M. Hayes, A. Walenstein, and A. Lakhotia. Evaluation of Malware Phylogeny Modelling Systems using Automated Variant Generation. Journal in Computer Virology , Springer, July 2008. DOI: 10.1007/s11416-008-0100-6. 6. A. Walenstein, R. Mathur, M. Chouchane, A. Lakhotia. Constructing Malware Normalizers Using Term Rewriting. Journal in Computer Virology , 2008. 4(4), Nov. 2008. pp. 307-322. DOI: 10.1007/s11416-008-0081-5. 7. J. Herpin, A. Fekih, S. Golconda, and A. Lakhotia. Steering Control of the Autonomous Vehicle: CajunBot, Journal of Aerospace Computing, Information, and Communication, 4 (12), 2007, 1134-1142, DOI: 10.2514/1.35050. 8. A. Lakhotia, et al. “CajunBot: Architecture and Algorithms,” Journal of Field Robotics , 23 (8), 2006, 555-578, DOI: 10.1002/rob.20129. 9. A. Maida, S. Golconda, P. Mejia, A. Lakhotia, and C. Cavanaugh, “Subgoal-based local navigation and obstacle avoidance using a grid-distance field,” International Journal of Vehicle Autonomous Systems (IJVAS) 4 (2-4), 2006, pp. 122-142. DOI: 10.1504/IJVAS.2006.012203. 10. A. Lakhotia, E. U. Kumar, and M. Venable, “A Method for Detecting Obfuscated Calls in Malicious Binaries,” IEEE Transactions on Software Engineering , 31 (11), November 2005, pp. 955-968. 11. M. Karim, A. Walenstein, A. Lakhotia, and L. Parida, "Malware Phylogeny Generation using Permutations of Code," Journal of Computer Virology , Springer-Verlag, 1, 2005, pp. 13-23. 12. M. Harman, A. Lakhotia, and D. Binkley, "Theory and Algorithms for Slicing Unstructured Programs," Journal of Information and Software Technology , Elsevier, 48 (7): 549-565 (2006). 13. J. Nandigam, A. Lakhotia, C. Cech, "Experimental Evaluation of Agreement Between Programmers in Applying the Rules of Cohesion," J. of Software Maintenance: Research and Practice, John Wiley & Sons, 11, 1999, 35-53. 14. A. Lakhotia and J-C Deprez. "Restructuring Programs by Tucking Statements into Functions," J. of Information and Software Technology, Elsevier Science, 40, 1999, 677- 689. 15. T. W. Chan and A. Lakhotia, "Debugging Failures in the Presence of Voluminous Data," J. of Software Maintenance: Research and Practice, John Wiley & Sons, 10, 1998, 111-150. 16. A. Lakhotia, "A Unified Framework for Expressing Subsystem Classification Techniques," J. of Systems & Software, Elsevier Science, Inc., , 36, March 1997, pp. 211-231.

Lakhotia/CV Page 4 July 30, 2013 17. J. Li & A. Lakhotia, "Using Mathematical Induction in Systematic Program Development," Intl. J. of Software Engineering & Knowledge Engineering, World Scientific Press, Singapore, 4 (4), 1994, pp. 561-574. 18. A. Lakhotia, "Understanding Someone Else's Code: Analysis of Experiences," J. of Systems & Software, Elsevier Science, Inc., New York, 23, December, 1993, pp. 269-275. 19. A. Lakhotia & L. Sterling, "How to Control Unfolding When Specializing Interpreters," New Generation Computing Journal , Springer-Verlag & OMHSA, Tokyo, 8 (10), 1990, pp. 61-70. 20. A. Lakhotia & L. Sterling, "Composing Logic Programs with Clausal Join," New Generation Computing Journal , Springer-Verlag & OMHSA, Tokyo, 6 (2), 1988, pp. 211- 225.

BOOK & BOOK CHAPTERS 21. A. Fekih, S. Golconda, J. Herpin, A. Lakhotia, "Steering Controller of the CajunBot II," Chapter 8, pp.195-207, Experience from the DARPA Urban Challenge , Springer, 2012. 22. G. Seetharaman, A. Lakhotia, & E. P. Blasch (Eds.), Special Issue on Unmanned Vehicles, IEEE Computer , 39 (12), December 2006. 23. K. Efe, V. Raghavan, and A. Lakhotia, “Content and Link Structure Analysis for Searching the Web”, Y. Zhang, A. Kandel, T. Y. Lin, Y. Y. Yao, (Eds.), World Scientific Press, 2003. 24. G. Canfora & A. Lakhotia (Guest Eds.) Special Issue on Program Comprehension, Journal of Systems and Software, 44 (1), January 1999. 25. G. Canfora & A. Lakhotia (Eds.), Proceedings of the 5th International Workshop on Program Comprehension, IEEE Computer Society Press, 1997. 26. A. Lakhotia & L. Sterling, "ProMiX: A Prolog Partial Evaluation System," The Practice of Prolog , L. Sterling (Ed.), MIT Press, 1990.

PATENTS AND PATENT APPLICATIONS

1. A. Lakhotia, M. E. Karim, and A. Walenstein, “Phylogeny Generation,” US Patent Number 7,873,947, January 18, 2011.

REFEREED CONFERENCE PROCEEDINGS 27. Andrew Walenstein and Arun Lakhotia. “A Transformation-Based Model of Malware Derivation”, 7th IEEE International Conference on Malicious and Unwanted Software (MALWARE). October 16-18, 2012, Fajardo, Puerto Rico. 28. Anshuman Singh, Andew Walenstein, Arun Lakhotia. "Tracking Concept Drift in Malware Families" AISec'12: Workshop on Security and Artificial Intelligence , November 19 2012, Raleigh, NC, USA, © Copyright 2012 ACM. 29. Craig Miles, Arun Lakhotia, Andrew Walenstein. In Situ Reuse of Logically Extracted Functional Components, European International Conference on Anti-Virus Research, EICAR’2012 , (accepted). 30. Mila Dalla Preda, Wu Feng, Roberto Giacobazzi, Richard Greechie and Arun Lakhotia. Twisting Additivity in Program Obfuscation, Sixth International Conference on Information Systems Technology and Management , Workshop on Program Protection and Reverse Engineering, Grenoble, March 28-30, 2012, Grenoble, France. DOI: 10.1007/978- 3-642-29166-1_30

Lakhotia/CV Page 5 July 30, 2013 31. Charles Ledoux, Andrew Walenstein and Arun Lakhotia. Improved Malware Classification Through the Use of Differences in Sensor Outputs, Sixth International Conference on Information Systems Technology and Management , Workshop on Program Protection and Reverse Engineering, Grenoble , March 28-30, 2012, Grenoble, France. DOI: 10.1007/978- 3-642-29166-1_32 32. Anshuman Singh, Sumi Singh, Andrew Walenstein and Arun Lakhotia. Deployable classifiers for malware detection, Sixth International Conference on Information Systems Technology and Management , Workshop on Program Protection and Reverse Engineering, Grenoble , March 28-30, 2012, Grenoble, France. 33. Anshuman Singh and Arun Lakhotia. Game-theoretic Design of an Information Exchange Model for Detecting Packed Malware, 6 th IEEE International Conference on Malicious and Unwanted Software (MALWARE 2011), Puerto Rico, October 18-19, 2011. DOI: 10.1109/MALWARE.2011.6112319 34. Anshuman Singh, Sumi Singh, Andrew Walenstein, and Arun Lakhotia. On Deployable Adversarial Classification Models, Proceedings of the 4 th ACM Workshop on Artificial Intelligence and Security , October 21, 2011, Chicago, IL. 35. A. Singh, A. Lakhotia, and A. Walenstein. Malware Antimalware Games, I nternational Conference on Information Warfare , ICIW2010, Wright Patterson Airforce Base, OH, April 8-9, 2010, pp. 319-327. 36. A. Lakhotia, D. Boccardo, A. Singh, A. Manacero, Jr. Context-Sensitive Analysis of Obfuscated x86 Executables. Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, PEPM 2010, Madrid, Spain, January 18-19, 2010, pp. 131-140. DOI: 10.1145/1706356.1706381. 37. D. Boccardo, A. Lakhotia, M. Venable, and Aleardo Manacero, Jr. Adapting Call-String Approach for x86 Obfuscated Binaries, 9th Brazilian Conference on Information and Computer System Security , Campinas, Brazil, Sept-Oct 2009. 38. A. Singh, B. Mai, A. Walenstein, A. Lakhotia. On Optimal AV System Strategies Against Obfuscated Malware, Annual Symposium on Information Security 2009, Albany, NY, June 2009. 39. M. R. Chouchane, A. Walenstein, and A. Lakhotia. Using Markov Chains to Filter Machine-morphed Variants of Malicious Programs, Proceedings of 3 rd International Conference on Malicious and Unwanted Software (Malware 2008) , Alexandria, VA, October 2008. 40. M. Hayes, A. Walenstein, and A. Lakhotia. Evalution of Malware Phylogeny Modelling Systems using Automated Variant Generation. Proceedings of 17 th EICAR Annual Conference (EICAR 2008) , Laval, France, May 2008. 41. K. Efe, A.V. Asutay, and A. Lakhotia. A User Interface for Exploiting Web Communities in Searching the Web, 4th International Conference on Web Information Systems and Technologies (WEBIST), May 2008. 42. M. R. Chouchane, A. Walenstein, and A. Lakhotia, Statistical Signatures for Fast Filtering of Instruction-Substituting Metamorhpic Malware, Fifth ACM Workshop on Recurring Malcode (WORM’07), Alexandria, Virginia, USA, November, 2007. DOI: 10.1145/1314389.1314397. 43. A. Walenstein, R. Mathur, M. Chouchane, and A. Lakhotia, “The Design Space of Metamorphic Malware,” 2 nd International Conference on Information Warfare (ICIW2007) , Monterey, CA, March 2007.

Lakhotia/CV Page 6 July 30, 2013 44. M. Chouchane and A. Lakhotia, “Using Engine Signature to Detect Metamorphic Malware,” Proceedings of the Fourth ACM Workshop on Recurring Malcode (WORM) , Fairfax, VA, November 2006, pp. 73-78. DOI: 10.1145/1179542.1179558. 45. A. Walenstein, R. Mathur, M. Chouchane, and A. Lakhotia, “Normalizing Metamorphic Malware Using Term Rewriting”, IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), , PA, September 2006 (Received Best Paper Award). 46. M. Karim, L. Parida, A. Lakhotia, “Using Permutation Patterns for Content-Based Phylogeny,” 2006 Workshop on Pattern Recognition in Bioinformatics (PRIB2006), Hong Kong, China, Lecture Notes in Bio Informatics (LNBI 4146), Springer Verlag, August 2006, pp. 115-125. 47. S. Golconda, P. Mejia, and A. Lakhotia, “Extendable Grid Representation for Navigation and Obstacle Detection,” IEEE Position Location and Navigation Symposium (PLANS 2006), San Diego, April 2006. 48. M. Venable, M. R. Chouchane, Md. E. Karim, and A. Lakhotia, "Analyzing Memory Accesses in Obfuscated x86 Executables," K. Julisch and C. Kruegel (Eds.): Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2005, LNCS 3548 , Springer-Verlag Berlin Heidelberg, pp. 1 – 18, 2005 49. A. Lakhotia, M. E. Karim, A. Walenstein, and L. Parida, "Malware Phylogeny using Maximal Pi-Patterns", EICAR 2005 Conference: Best Papers Proceedings , Malta, pp. 156- 174, April-May, 2005. 50. A. Lakhotia and M. Mohammed, “Imposing Order on Program Statements and its implication to AV Scanners,” in Proceedings of 11 th IEEE Working Conference on Reverse Engineering , Delft, The Netherlands, November 2004, pp. 161-171. 51. R. Loganantharaj, M. E. Karim, A. Lakhotia, “Recognizing TATA Promoters Based on Discriminating Frequency Analysis of Neighborhood Tuples,” in Proceedings of the First Biotechnology and Bioinformatics Symposium (BIOT-04), Colorado Springs, September 24, 2004. 52. A. Lakhotia and U. Eric, “Stack Shape Analysis to Detect Obfuscated Calls in Binaries,” in Proceedings of Fourth IEEE International Workshop on Source Code Analysis and Manipulation , Chicago, IL, September 2004, pp. 17-26. 53. R. G. Cheek, E. Payton, E., and A. Lakhotia. “The Outsourcing of Human Resources.” Academy of Entrepreneurship as part of The Allied Academies International Conference, Las Vegas, NV, October 15-18, 2003. 54. R. Cheek, K. Tran, K., and A. Lakhotia. “eCRM: Outsourced in India.” Academy of Strategic E-Commerce as part of The Allied Academies International Conference, Las Vegas, NV, October 15-18, 2003. 55. R. Cheek, A. Lakhotia, and L. Pan. “Cyber Security Challenges in Financial Industries.” Academy of Banking and Commercial Finance as part of The Allied Academies International Conference, Las Vegas, NV, October 15-18, 2003. 56. A. Walenstein, N. Jyoti, A. Lakhotia, J. Li, and Y. Yang, “Problems Creating Task-relevant Clone Detection Reference Data,” in Proceedings of Working Conference on Reverse Engineering (WCRE2003), Victoria, Canada, November 2003, pp. 285-294. 57. A. Walenstein and A. Lakhotia, “Clone Detector Evaluation Can be Improved: Ideas from Information Retrieval,” Proceedings 2 nd International Workshop on Detection of Software Clones (IWDSC’2003) , November 24, 2003.

Lakhotia/CV Page 7 July 30, 2013 58. P. K. Singh, M. Mohammed, and A. Lakhotia, “Using Static Analysis and Verification for Analyzing Virus and Worm Programs,” in Proceedings of Second European Conference on Information Warfare , Reading, UK, June 2003. 59. P. K. Singh and A. Lakhotia, "Static Verification of Worm and Virus Behavior in Binary Executables using Model Checking," (extended abstract) in 4th IEEE Information Assurance Workshop , West Point, NY, June 2003. 60. J-C. Deprez and A. Lakhotia, “A Formalism to Automate Mapping from Program Features to Code,” International Workshop on Program Comprehension, Limerick, Ireland, IEEE Computer Society Press, July 2000. 61. A. Lakhotia and J-C. Deprez, "Restructuring Functions with Low Cohesion," Proceedings of the 6th Working Conference on Reverse Engineering, (WCRE'99), Atlanta, GA, October 6- 8, 1999, IEEE Computer Society Press, pp. 36-46. 62. A. Lakhotia, "DIME: A Direct Manipulation Environment for Evolutionary Development of Software," International Working Conference on Program Comprehension, Ischia, Italy, IEEE Computer Society Press, June 1998, pp. 72-79. 63. A. Lakhotia and J. M. Gravley, "Identifying Enumeration Types Modeled with Symbolic Constants," Working Conference on Reverse Engineering, Monterey, CA, IEEE Computer Society, November 1996, pp. 227-236. 64. J. Nandigam and A. Lakhotia, "A Measure for Module Cohesion and its Validation," 1995 Software Engineering Research Forum, Boca Raton, Florida, November 1995. 65. A. Lakhotia and J. M. Gravley, "A Measure of Congruence Between Architectures of a Software System," 2nd Working Conference on Reverse Engineering, Toronto, Canada, July 1995, pp. 262-269. 66. A. Lakhotia, L. Sterling, & D. Bojantchev, "Development of a Prolog Tracer by Stepwise Enhancement," Proc. the Third International Conference on Practical Application of Prolog, International Association of Logic Programming, Paris, April 1995, pp. 353-393. 67. A. Lakhotia, "Wolf: A Tool for Recovering Dataflow Oriented Designs from Source Code," Fifth Annual Workshop on Systems Reengineering Technology, Monterey, CA, Sponsored by Naval Surface Warfare Center, February 1995. 68. A. Lakhotia "Rule-Based Approach to Computing Module Cohesion," 15th International conference on Software Engineering, IEEE Computer Society, May 1993, pp. 35-44. 69. A. Lakhotia, "Constructing Call Multigraphs using Dependence Graphs," 12th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 1993, pp. 273-284. 70. A. Lakhotia & T. W. Chan, "Data Slicing by Dynamic Program Slicing," Software Engineering Research Forum, November 1993, pp. 245-254. 71. A. Lakhotia, "Analysis of Experiences with Modifying Computer Programs," Abstract in 5th Workshop on empirical studies of programmers, December 1993, pp 225. 72. T. Chan and A. Lakhotia, "Integrating Testing and Debugging Using Data Slicing," ASME Symposium on Computers in Engineering, Houston, February 1993, pp. 1-6. 73. A. Lakhotia, "To PE or not to PE," META90: Proceedings of the workshop on meta- programming in Logic, Belgium, April 1990. 74. A. Lakhotia & L. Sterling, "Program Development by Stepwise Enhancement," Second International Conference on Software Engineering and Knowledge Engineering, Knowledge Systems Institute, Skokie, June 21-23, 1990, pp. 78-83. 75. A. Lakhotia, "Incorporating `Programming-Techniques' into Prolog Programs," Logic Programming: Proceedings of the North American Conference 1989, MIT Press, October 1989, 426-440.

Lakhotia/CV Page 8 July 30, 2013 76. L. Sterling & A. Lakhotia, "Composing Prolog Meta-Interpreters," Logic Programming: Proceedings of the Fifth International Conference and Symposium, MIT Press, August, 1988, pp. 386-403. 77. A. Lakhotia & L. Sterling, "Composing Logic Programs with Clausal Join," Workshop on Partial Evaluation and Mixed Computation, Denmark, October 1987 78. A. Lakhotia, "Spatial Data Abstraction," XVIII Conference of the Computer Society of India, Ahmedabad, January 1983

ABSTRACTS AND UNREFEREED PUBLICATIONS 1. A. Lakhotia and A. Walenstein, A Self-Learning AV Scanner, 11 th Association of Anti-Virus Asia Researchers (AVAR) , New Delhi, December 2008. 2. B. Mai, A. Singh, A. Walenstein, and A. Lakhotia, Using Game Theory to Assess the Strength of an AV System Against Evolving Offenses, Virus Bulletin Conference 2008 , Ottawa, CA, September-October 2008. 3. M. Chouchane, A. Walenstein, and A. Lakhotia. Metamorphic Authorship Recognition Using Markov Models, Virus Bulletin , May 2008. 4. P. Cutt and A. Lakhotia, Autonomy in 3D: Virtual Reality Preps Vehicle for Urban Challenge, Unmanned Systems , Vol. 25, No. 3, May/June 2007. pp 39-40. http://www.auvsi.org/members/FeaturedArticles/may_june07/may_june07.pdf 5. A. Walenstein, M. Venable, M. Hayes, C. Thompson, and A. Lakhotia, Exploiting Similarity Between Variants to Defeat Malware,” Proceedings of BlackHat Briefings , Washington DC, February 2007. 6. M. Venable, A. Walenstein, M. Hayes, C. Thompson, A. Lakhotia, Vilo: A Shield in the Malware Variation Battle, Virus Bulletin , July 2007. 7. G. Seetharaman, A. Lakhotia, E. P. Blasch, Unmanned Vehicles Come of Age: The DARPA Grand Challenge, IEEE Computer , 39 (12), pp. 26-29, December 2006. 8. Karim, M. E., Lakhotia, A. Collective Patterns in HIV Sequences, 13 th International workshop on HIV Dynamics and Evolution, Massachusetts, 2006 (Abstract) 9. Karim, M. E., Lakhotia, A. Inferring Mutation Sites in HIV Sequences using Collective Patterns, 3rd Annual Conference of the Mid South Computational Biology and Bioinformatics Society (MCBIOS), Baton Rouge, 2006 (Abstract) 10. U. K. Eric, A. Kapoor, and A. Lakhotia, "DOC- Answering the Hidden 'Calls' of Virus," Virus Bulletin, April 2005. 11. A. Lakhotia, A. Kapoor, and E. U. Kumar, “Are Metamorphic Viruses Really Invincible?” Virus Bulletin , December 2004 and January 2005. 12. M. Venable, P. Pathak, and A. Lakhotia, “Getting into Beagle’s Backdoor,” Virus Bulletin , July 2004, pp. 9-13. 13. A. Lakhotia and P. K. Singh, Challenges in getting 'Formal' with viruses, Virus Bulletin , September 2003. UNPUBLISHED REPORTS 14. R. E. Aly, F. Bouz, B. R. Nallamilli, A. Lakhotia, and M. A. Bayoumi, “Partitioned Cache for Low-Energy Embedded System Design,” May 2004. 15. A. Lakhotia and A. Kapoor, “A Method for Identifying Segments of Code in Binary Executables,” May 2004.

Lakhotia/CV Page 9 July 30, 2013 SOFTWARE SYSTEMS DEVELOPED • BinJuice – Sytem to extract abstracted semantics from disassembled code (7/12) • Vilo – System to use computer virus phylogeny for malware analysis, with Andrew Walenstein (10/06) • TPIAWO (Advanced deobfuscator of call instructions), with Michael Venable (12/05) • DOC (Deobfuscator of Call instructions), with Eric Uday Kumar (12/04) • CajunBot (an autonomous, six-wheeled robotic vehicle), with Team CajunBot (3/04) • C-Right: Software Piracy Detection Tool, (12/01) • A+ Understanding IBM Highlevel Assembler to C, with J. Seaman, (10/99) • Wolf/Tear, A Tool to Decompose Large Code Fragments into Small Functions, with J-C. Deprez (8/97) • Wolf/DF, A Tool to Recover Dataflow Design from Source Code, with J. Nandigam (3/96) • CMT, A Cohesion Measurement Tool for C programs, with J. Nandigam (8/95) • Clustsys, Software Subsystem Classification using Cluster Analysis, with J. M. Gravley, S. Mohan, P. Poolkasem (8/95) • Simple slicer, A Program Slicer for a Simple Procedural Language, with T. Wongweeratorn (5/91) • ProMiX, A Prolog Partial Evaluation System, with L. S. Sterling (1/89) Visit http://www.cacs.louisiana.edu/~arun about availability of these software systems. STUDENTS SUPERVISED • Anshuman Singh, Ph.D., “Addressing Challenges in Machine Learning Based Malware Detection,” (Su/12). • Charles LeDoux, M.S., “Feature Fusion Across Domains for Improved Malware Classification”, (Fa/11). • Suresh Golconda, Ph.D., “CajunBot Path Planner Architecture for Autonomous Ground Vehicles in an Urban Environment,” (Sp/10). • Matthew Hayes, M.S., “Simulating Malware Evolution for Testing Phylogenies,” (Sp/08). • Mohamed Choucane, Ph.D., “Approximate Detection of Machine-Authored Malicious Programs,” (Sp/08). • Md. Enamul Karim, Ph.D., “MinMax Interval Tree,” (F/07). • Amit Puntambekar, M.S., “Terrain Mapping and Obstacle Detection for Unmanned Autonomous Ground Robots Without Sensor Stabilization,” (F/06). • Vidhyalakshmi Venkitarakrishnan, M.S., “CBWare - Distributed Middleware for Autonomous Ground Vehicles,” (F/06). • Rachit Mathur, M.S., “Normalizing Metamorphic Malware using Term-Rewriting,” (F/06). • Michael Venable, M.S., “Detecting Call Obfuscations in x86 Executables,” (Su/05) • Suresh Golconda, M.S., “Progressive Steering of Skid-Steered Vehicle,” (Sp/05) • Uday Eric Kumar, M.S. “Stack Shape Graph,” (F/04) • Aditya Kapoor, M.S., “Code Intensive Disassembly,” (F/04) • Moinuddin Mohammed, M.S., “ZEROing in on Metamorphic Viruses “, (S/03) • J-C. Deprez, Ph.D., “Detecting Ripple Effects of Program Modifications on a Software System’s Functionality,” (S/03). • Prashant Pathak, M.S., “Linux Reloaded: A Linux System Hardened Against Buffer Overflow Attacks”, (Su/03)

Lakhotia/CV Page 10 July 30, 2013 • Prabhat Singh, M.S., “Physiological Decomposition of Virus and Worm Programs,” (F/02) • S. S. Kame, M.S., “Program Slicing in the Presence of Global Variables,” (S/99) • J-C. Deprez, M.S., “A Context-Sensitive Formal Transformation for Restructuring Programs” (F/97) • Anurag Bhatnagar, Ph.D., “A Relational Approach to Specifying and Recognizing Program Patterns” (S/96) • Jagadish Nandigam, Ph.D., “A Measure for Module Cohesion” (S/95) • Tat W. Chan, Ph.D., “Debugging Program Failures Exhibited by Voluminous Data” (S/94)

SERVICE TO THE PROFESSION • 2013, co-Chair Technical Program Committee, IEEE International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, Puerto Rico. • 2012, co-Program Chair, Program Protection and Reverse Engineering Workshop, Grenoble, France. • 2010, Program Committee, International Conference on Information Warfare, Wright Patterson Airforce Base, OH. • 2009, Program Committee, Malware 2009, Montreal, Canada. • 2009, Program Committee, Annual Symposium on Information Assurance (ASIA'2009), Albany, NY. • 2008, Program Committee, International Conference on Information Warfare, Durban, South Africa. • 2006, Guest Co-Editor of IEEE Computer, Special Issue on Unmanned Vehicles . • 2006, Workshop Co-chair/organizer: Dagstuhl Workshop on Duplication, Redundancy, and Similarity in Software Systems. • 2006, Member, Program Committee, IEEE International Workshop on Source Code Analysis and Manipulation, Philadelphia, PA. • 2005, Member, Program Committee, International Conference on Information Warfare. • 2004, Member, Program Committee, Third European Conference on Information Warfare. • 2003, Co-Chair, 2 nd International Workshop on Detection of Software Clones • 2003, Workshop on Cyber Security, Lafayette. • 2003, Working Session on Benchmark for Clone Detection, 11 th IEEE International Workshop on Program Comprehension. • 2003, Member, Program Committee, 11 th IEEE International Workshop on Program Comprehension. • 1998, Guest Editor, Journal of Systems & Software, Special Issue on Selected Papers from IWPC'97 • 1998, Member, Program Committee, Sixth International Workshop on Program Comprehension, Ischia, Italy • 1997, Program Co-Chair, Fifth International Workshop on Program Comprehension, Dearborn, Michigan • 1995, Member, Program Committee, Fourth Workshop on Program Comprehension, Germany, 1996, Sponsored by IEEE Computer Society • 1995, Chair, Advanced Software Reengineering Tools. Sponsored by: Louisiana Board of Regents.

Lakhotia/CV Page 11 July 30, 2013 • 1995, Member, Program Committee, Fourth Software Engineering Research Forum, Boca Raton, FL. • 1993, Member, Program Committee, Third Software Engineering Research Forum, Orlando, FL. • 1993, Member, Program Committee, Fifth International Conference on Software Engineering and Knowledge Engineering, San Francisco, CA. Sponsored by: Knowledge Systems Institute, IL. • 1992, Member, Program Committee, Workshop on Partial Evaluation and Program Manipulation, San Francisco, CA. Sponsored by: ACM SIGPlan. • 1992, Co-Chair, Fifth Workshop on Algorithmics Research in the Midsouth Region, Lafayette, LA. Sponsored by USL. • 1991, Member, Program Committee, Third International Conference on Software Engineering and Knowledge Engineering, Skokie, IL. Sponsored by: Knowledge Systems Institute • 1990-1, Secretary, Computer Professionals for Social Responsibility - Acadiana Chapter, Lafayette, LA. • 1989, Chair, NACLP'89 Workshop on Logic Programming Environments, Cleveland, OH. Sponsored by: Association of Logic Programming STATE, UNIVERSITY, AND DEPARTMENT COMMITTEES • 2009, Lead, Committee to form Institute of Robotics, Sensors, and Control • 2009, Chair, Louisiana Computing Carnival • 2009, Chair, CACS Student Recruitment Committee • 2009, Member, CACS Website Committee • 2003-04, Member, Summer Research Award Selection committee • 2001-03, Char, Louisiana Distinguished Lecture Series • 1999, Co-Chair, CACS2000 Centennial Computing Workshop • 1996-97, Co-Chair, Distinguished Lecture • 1995-97, Advisor, CACS Student-Teachers-Alumni (STA) Association • 1994-98, USL's Coordinator, Louisiana Space Grant Consortium, Louisiana • 1994-95, Member, Q-S-N Committee for CACS' Director search, CACS • 1994-95, Chair, Student Committee, CACS • 1993-94, Chair, Student Recruitment Committee, CACS • 1992-93, Member, Student Recruitment Committee, CACS • 1993, Member, Research Committee, CACS • 1989-, Chair, Software Engineering Comprehensive Exam, CACS

COMMUNITY SERVICE • 2010-11, President, Acadiana Indian Association • 2005 – till, Foster parent for abandoned dogs for Acadiana Humane Society, PAAW, and other organizations.

Lakhotia/CV Page 12 July 30, 2013