Biographical Sketch
Total Page:16
File Type:pdf, Size:1020Kb
BIOGRAPHICAL SKETCH ARUN LAKHOTIA Center for Advanced Computer Studies University of Louisiana at Lafayette, Lafayette, LA [email protected] RESEARCH INTERESTS • Cyber Security: Malware Analysis • Autonomous Vehicles EDUCATION • Ph.D., Computer Science, Case Western Reserve University, Cleveland, OH, USA (1990) • M.Sc. (Tech.) Computer Science, Birla Institute of Technology and Science, Pilani, India (1982) EMPLOYMENT HISTORY • 8/06 – till, Professor, University of Louisiana at Lafayette, Lafayette, LA • 7/09 – till, Adjunct Professor, Birla Institute of Technology and Science, Pilani, India • 8/96 – 8/06, Associate Professor, University of Louisiana at Lafayette, Lafayette, LA • 8/89 - 8/96, Assistant Professor, University of Louisiana at Lafayette, Lafayette, LA • 8/85 - 8/89, Research Assistant, Case Western Reserve University, Cleveland, OH • Summers 86, 87, 88, Summer Development Student, Computer Science Center, Texas Instruments, Dallas, TX • 3/84 - 7/85, Project Leader, Madras Computers Laboratories, Madras, India • 2/83 - 2/84, Software Engineer, Zenith Computer Systems, Ltd., Bombay, India • 1/82 - 5/82, Teaching Assistant, Birla Institute of Technology and Science, Pilani, India SCIENTIFIC CONSULTING • Expert Consultant, Hawkins and Garbin, LLC, Lafayette, LA • Co-Member, Evidence Management Systems, LLC, New Orleans • Co-Founder, OnlineCSR.Com • Consultant and Technical Project Manager, Med-Data Management, Inc. • Expert Consultant, Lamothe & Hamilton Law Firm • Advisor, The Solution Set, Inc., Lafayette, LA • Consulting Scientist, SICOR Consortium, New Jersey • President & CEO, Lakhotia Software, Inc. (www.lakhotia-software.com) RECOGNITIONS AND AWARDS • CajunBot-II semi-finalist in 2007 DARPA Urban Challenge • Lockheed Martin Corporation BORSF Professor • CajunBot ranked 15 out of 23 finalists in the 2005 DARPA Grand Challenge. Lakhotia/CV Page 1 July 30, 2013 • Louisiana Governor’s 2004 University Technology Leader of the Year . • Louisiana Governor Kathleen Blanco proclaimed June 2, 2004 as CajunBot Day, in recognition of the achievements of Team CajunBot, led by me. • Louisiana House of Representative passed House Resolution 87, Regular Session, 2004 to “express enduring gratitude for the pride and honor” brought by Team CajunBot to the State of Louisiana. • CajunBot amongst 13 finalists in the 2004 DARPA Grand Challenge. • CACS Oustanding Undergraduate Teaching Award (2000) • Outstanding Teacher Award, by CACS Student-Teacher-Alumni Association (1995) EXPERT WITNESS • April - May, 2003. Expert for plaintiff in Ogwyn Enterprises, Inc. v Fraze, et al., Attorney: Mr. Scott M. Hawkins, Hawkins & Garbin, LLC. • July – December 1999. Expert for MedLink Development, L.L.C. et al.vs. MedLink Systems, L.L.C. et al., and Med Data Software Solutions, L.L.C. et al., No. 99-1994 (K) (2). Attorney: Mr. Kirk Reasonover, Lamothe & Hamilton, LLC, New Orleans. RESEARCH GRANTS • Co-PI, AFOSR, Semi-Supervised Algorithms against Malware Evolution – Phase II (SESAME), STTR 2011 program. Subcontract through Charles Rivers Analytics, (Total UL: $300,000, UL Indirect Cost: $169,000; Total Project: $750,000) , 3/13-4/15 • Co-PI, AFOSR, Semi-Supervised Algorithms against Malware Evolution – Phase I (SESAME), STTR 2011 program. Subcontract through Charles Rivers Analytics, (Total UL: $40,000, UL Indirect Cost: $12,028; Total Project: $100,000), 3/12-9/12 • Co-PI, ARO, “Cloud-based Autonomous Real-time Malware Analysis (CARMA).” STTR 2011 program. Subcontract through Charles Rivers Analytics, Total UL Budget: $40,000, UL Indirect Cost: $12,028; Total Project $100,000, 6/11-3/12. • Co-PI, DARPA, “MAAGI – Malware Analysis and Attribution using Genetic Information,” subcontract amount $1,001,441, 09/10-09/14. • Lead-PI, Air Force Office of Scientific Research, “Obfuscation and Deobfuscation of Intent of Computer Programs,” $789,989, 09/09-09/12. • Co-PI, United States Department of the Interior, “Technical assistant for tabular and spatial data management, analysis, dissemination, and visualization for CWPPRA and CERP,” $230,334, 08/08-08/10. • PI, University of Louisiana at Lafayette, “Autonomous Ground Vehicles,” About $350k/year, 07/05-06/07. • PI, University of Louisiana at Lafayette, “Commercializing Next-Generation Anti-Virus Technologies,” About $320K per year, 07/05-06/07. • PI, University of Louisiana at Lafayette, “CajunBot: Autonomous Vehicle,” $250,000, 01/04-11/05. • PI, State of Louisiana, “Technology for Resolving Copyright Disputes,” $500,000, 8/01- 8/05. • PI, State of Louisiana, “Technology for Detecting Computer Viruses and Worms,” $700,000, 8/01-8/05. Lakhotia/CV Page 2 July 30, 2013 • PI, DoD (IDEA Program), “Restructuring Complex Program Fragments into Smaller Cohesive Units,” In collaboration with Leverage Technologists, MD, 1/96-12/96, ($153K) • PI, LEQSF (BOR match to DEPSCoR awardees), “Fostering Research on Software Reengineering in Louisiana,” 1/96-12/96, ($51K). • PI, ARPA (DEPSCoR program), “Identifying Objects in Legacy Systems for Reuse and Re- Engineering,” 8/94 - 12/98, ($258K). • PI, LEQSF (Research Competitiveness Subprogram), “Recovering Dataflow Design of Software Systems from Source Code,” 6/93 - 5/95, ($66K) • Lead PI, LEQSF (Equipment grant), “Facilities for Advanced Studies of Architectures of Large Software Systems,” Co-PIs: Williams Edwards, Dennis Moreau 6/92 - 5/93, ($106K) • PI, USL (Summer research award), “Study of Architectures Of Large Software Systems,” 6/92 - 8/92, $4K PRESENTATIONS Excluding presentations of published works. 01/13 “Fast location of similar code fragments using semantic ‘juice’”. Program Protection and Reverse Engineering Workshop, Rome, Italy. 11/12 “Android Malware – Not just an old win in new bottle”, Keynote speaker. Third Workshop on Application and Techniques in Information Security, Melbourne, Australia. 12/08 “Autonomous Vehicles.” Invited talk, Amrita College of Engineering, Amritapuri, Kerala, India. 10/06 “Computer Virus: Theory and Practice,” Keynote speaker, Scientific ICT Research Netherlands (SIREN2006), Utrecht, The Netherlands. 04/06 “A Method for Detecting Obfuscated Calls in Malicious Binaries,” Invited speaker, The Sixth Astrenet Workshop: Source Code Analysis and Manipulation for Security, London, UK. 01/06 “Analysis of Adversarial Code: Problem, Challenges, Results,” BlackHat Federal Show 2006, Crystal City, Alexandria, Virginia. 11/05 “Analysis of Adversarial Code: Problem, Challenges, Results,” Washington Area Trustworthy Systems Hour, National Science Foundation. 06/05 “Hardened Analysis: Battling Malicious Code,” Symantec Corporation, Santa Monica, CA. 02/05 Banquet Speaker, MATHCOUNTS Award Banquet, Louisiana Engineering Society 11/04 “Virus Analysis: Tools, Techniques, and Research Issues,” a half-day tutorial presented in Technical University, Delft, during the IEEE Working Conference on Reverse Engineering, 2004. 08/04 “CajunBot: Research Challenges”, Birla Institute of Technology and Science, Pilani, India. 08/02 “U.S. Copyright Laws,” at Momentum India Pvt. Ltd., NOIDA, India. 11/02 “Intellectual Property: And the Nerd’s Rule,” to Lafayette Junior Leadership: Education and Technology Day. 12/02 “Secure Communications”, FBI Infragard Lafayette Chapter. PUBLICATIONS REFEREED JOURNALS Lakhotia/CV Page 3 July 30, 2013 1. Radhouane Chouchane, Natalia Stakhanova, AndrewWalenstein, Arun Lakhotia, Detecting Machine-Morphed Malware Variants via Engine Attribution. Journal in Computer Virology . Springer Paris, to appear. 2. Craig Miles, Arun Lakhotia, and Andrew Walenstein. In Situ Reuse of Logically Extracted Functional Components. Journal in Computer Virology . Springer Paris, 8 (3): 73-84. DOI: 10.1007/s11416-012-0167-y. 3. Kemal Efe, Alp V. Asutay, Arun Lakhotia: Exploring Web Neighbours in Exploratory Search. IJWIS 7(2): 152-182 (2011). 4. Arun Lakhotia, Davidson R. Boccardo, Anshuman Singh, Aleardo Manacero Jr.: Context- sensitive analysis without calling-context. Higher-Order and Symbolic Computation 23 (3): 275-313 (2010). 5. M. Hayes, A. Walenstein, and A. Lakhotia. Evaluation of Malware Phylogeny Modelling Systems using Automated Variant Generation. Journal in Computer Virology , Springer, July 2008. DOI: 10.1007/s11416-008-0100-6. 6. A. Walenstein, R. Mathur, M. Chouchane, A. Lakhotia. Constructing Malware Normalizers Using Term Rewriting. Journal in Computer Virology , 2008. 4(4), Nov. 2008. pp. 307-322. DOI: 10.1007/s11416-008-0081-5. 7. J. Herpin, A. Fekih, S. Golconda, and A. Lakhotia. Steering Control of the Autonomous Vehicle: CajunBot, Journal of Aerospace Computing, Information, and Communication, 4 (12), 2007, 1134-1142, DOI: 10.2514/1.35050. 8. A. Lakhotia, et al. “CajunBot: Architecture and Algorithms,” Journal of Field Robotics , 23 (8), 2006, 555-578, DOI: 10.1002/rob.20129. 9. A. Maida, S. Golconda, P. Mejia, A. Lakhotia, and C. Cavanaugh, “Subgoal-based local navigation and obstacle avoidance using a grid-distance field,” International Journal of Vehicle Autonomous Systems (IJVAS) 4 (2-4), 2006, pp. 122-142. DOI: 10.1504/IJVAS.2006.012203. 10. A. Lakhotia, E. U. Kumar, and M. Venable, “A Method for Detecting Obfuscated Calls in Malicious Binaries,” IEEE Transactions on Software Engineering , 31 (11), November 2005, pp. 955-968. 11. M. Karim, A. Walenstein, A. Lakhotia, and L. Parida, "Malware Phylogeny Generation using Permutations of Code," Journal of Computer Virology , Springer-Verlag, 1, 2005, pp. 13-23. 12. M. Harman, A. Lakhotia, and D. Binkley, "Theory and Algorithms for Slicing Unstructured Programs," Journal