Biographical Sketch

Biographical Sketch

BIOGRAPHICAL SKETCH ARUN LAKHOTIA Center for Advanced Computer Studies University of Louisiana at Lafayette, Lafayette, LA [email protected] RESEARCH INTERESTS • Cyber Security: Malware Analysis • Autonomous Vehicles EDUCATION • Ph.D., Computer Science, Case Western Reserve University, Cleveland, OH, USA (1990) • M.Sc. (Tech.) Computer Science, Birla Institute of Technology and Science, Pilani, India (1982) EMPLOYMENT HISTORY • 8/06 – till, Professor, University of Louisiana at Lafayette, Lafayette, LA • 7/09 – till, Adjunct Professor, Birla Institute of Technology and Science, Pilani, India • 8/96 – 8/06, Associate Professor, University of Louisiana at Lafayette, Lafayette, LA • 8/89 - 8/96, Assistant Professor, University of Louisiana at Lafayette, Lafayette, LA • 8/85 - 8/89, Research Assistant, Case Western Reserve University, Cleveland, OH • Summers 86, 87, 88, Summer Development Student, Computer Science Center, Texas Instruments, Dallas, TX • 3/84 - 7/85, Project Leader, Madras Computers Laboratories, Madras, India • 2/83 - 2/84, Software Engineer, Zenith Computer Systems, Ltd., Bombay, India • 1/82 - 5/82, Teaching Assistant, Birla Institute of Technology and Science, Pilani, India SCIENTIFIC CONSULTING • Expert Consultant, Hawkins and Garbin, LLC, Lafayette, LA • Co-Member, Evidence Management Systems, LLC, New Orleans • Co-Founder, OnlineCSR.Com • Consultant and Technical Project Manager, Med-Data Management, Inc. • Expert Consultant, Lamothe & Hamilton Law Firm • Advisor, The Solution Set, Inc., Lafayette, LA • Consulting Scientist, SICOR Consortium, New Jersey • President & CEO, Lakhotia Software, Inc. (www.lakhotia-software.com) RECOGNITIONS AND AWARDS • CajunBot-II semi-finalist in 2007 DARPA Urban Challenge • Lockheed Martin Corporation BORSF Professor • CajunBot ranked 15 out of 23 finalists in the 2005 DARPA Grand Challenge. Lakhotia/CV Page 1 July 30, 2013 • Louisiana Governor’s 2004 University Technology Leader of the Year . • Louisiana Governor Kathleen Blanco proclaimed June 2, 2004 as CajunBot Day, in recognition of the achievements of Team CajunBot, led by me. • Louisiana House of Representative passed House Resolution 87, Regular Session, 2004 to “express enduring gratitude for the pride and honor” brought by Team CajunBot to the State of Louisiana. • CajunBot amongst 13 finalists in the 2004 DARPA Grand Challenge. • CACS Oustanding Undergraduate Teaching Award (2000) • Outstanding Teacher Award, by CACS Student-Teacher-Alumni Association (1995) EXPERT WITNESS • April - May, 2003. Expert for plaintiff in Ogwyn Enterprises, Inc. v Fraze, et al., Attorney: Mr. Scott M. Hawkins, Hawkins & Garbin, LLC. • July – December 1999. Expert for MedLink Development, L.L.C. et al.vs. MedLink Systems, L.L.C. et al., and Med Data Software Solutions, L.L.C. et al., No. 99-1994 (K) (2). Attorney: Mr. Kirk Reasonover, Lamothe & Hamilton, LLC, New Orleans. RESEARCH GRANTS • Co-PI, AFOSR, Semi-Supervised Algorithms against Malware Evolution – Phase II (SESAME), STTR 2011 program. Subcontract through Charles Rivers Analytics, (Total UL: $300,000, UL Indirect Cost: $169,000; Total Project: $750,000) , 3/13-4/15 • Co-PI, AFOSR, Semi-Supervised Algorithms against Malware Evolution – Phase I (SESAME), STTR 2011 program. Subcontract through Charles Rivers Analytics, (Total UL: $40,000, UL Indirect Cost: $12,028; Total Project: $100,000), 3/12-9/12 • Co-PI, ARO, “Cloud-based Autonomous Real-time Malware Analysis (CARMA).” STTR 2011 program. Subcontract through Charles Rivers Analytics, Total UL Budget: $40,000, UL Indirect Cost: $12,028; Total Project $100,000, 6/11-3/12. • Co-PI, DARPA, “MAAGI – Malware Analysis and Attribution using Genetic Information,” subcontract amount $1,001,441, 09/10-09/14. • Lead-PI, Air Force Office of Scientific Research, “Obfuscation and Deobfuscation of Intent of Computer Programs,” $789,989, 09/09-09/12. • Co-PI, United States Department of the Interior, “Technical assistant for tabular and spatial data management, analysis, dissemination, and visualization for CWPPRA and CERP,” $230,334, 08/08-08/10. • PI, University of Louisiana at Lafayette, “Autonomous Ground Vehicles,” About $350k/year, 07/05-06/07. • PI, University of Louisiana at Lafayette, “Commercializing Next-Generation Anti-Virus Technologies,” About $320K per year, 07/05-06/07. • PI, University of Louisiana at Lafayette, “CajunBot: Autonomous Vehicle,” $250,000, 01/04-11/05. • PI, State of Louisiana, “Technology for Resolving Copyright Disputes,” $500,000, 8/01- 8/05. • PI, State of Louisiana, “Technology for Detecting Computer Viruses and Worms,” $700,000, 8/01-8/05. Lakhotia/CV Page 2 July 30, 2013 • PI, DoD (IDEA Program), “Restructuring Complex Program Fragments into Smaller Cohesive Units,” In collaboration with Leverage Technologists, MD, 1/96-12/96, ($153K) • PI, LEQSF (BOR match to DEPSCoR awardees), “Fostering Research on Software Reengineering in Louisiana,” 1/96-12/96, ($51K). • PI, ARPA (DEPSCoR program), “Identifying Objects in Legacy Systems for Reuse and Re- Engineering,” 8/94 - 12/98, ($258K). • PI, LEQSF (Research Competitiveness Subprogram), “Recovering Dataflow Design of Software Systems from Source Code,” 6/93 - 5/95, ($66K) • Lead PI, LEQSF (Equipment grant), “Facilities for Advanced Studies of Architectures of Large Software Systems,” Co-PIs: Williams Edwards, Dennis Moreau 6/92 - 5/93, ($106K) • PI, USL (Summer research award), “Study of Architectures Of Large Software Systems,” 6/92 - 8/92, $4K PRESENTATIONS Excluding presentations of published works. 01/13 “Fast location of similar code fragments using semantic ‘juice’”. Program Protection and Reverse Engineering Workshop, Rome, Italy. 11/12 “Android Malware – Not just an old win in new bottle”, Keynote speaker. Third Workshop on Application and Techniques in Information Security, Melbourne, Australia. 12/08 “Autonomous Vehicles.” Invited talk, Amrita College of Engineering, Amritapuri, Kerala, India. 10/06 “Computer Virus: Theory and Practice,” Keynote speaker, Scientific ICT Research Netherlands (SIREN2006), Utrecht, The Netherlands. 04/06 “A Method for Detecting Obfuscated Calls in Malicious Binaries,” Invited speaker, The Sixth Astrenet Workshop: Source Code Analysis and Manipulation for Security, London, UK. 01/06 “Analysis of Adversarial Code: Problem, Challenges, Results,” BlackHat Federal Show 2006, Crystal City, Alexandria, Virginia. 11/05 “Analysis of Adversarial Code: Problem, Challenges, Results,” Washington Area Trustworthy Systems Hour, National Science Foundation. 06/05 “Hardened Analysis: Battling Malicious Code,” Symantec Corporation, Santa Monica, CA. 02/05 Banquet Speaker, MATHCOUNTS Award Banquet, Louisiana Engineering Society 11/04 “Virus Analysis: Tools, Techniques, and Research Issues,” a half-day tutorial presented in Technical University, Delft, during the IEEE Working Conference on Reverse Engineering, 2004. 08/04 “CajunBot: Research Challenges”, Birla Institute of Technology and Science, Pilani, India. 08/02 “U.S. Copyright Laws,” at Momentum India Pvt. Ltd., NOIDA, India. 11/02 “Intellectual Property: And the Nerd’s Rule,” to Lafayette Junior Leadership: Education and Technology Day. 12/02 “Secure Communications”, FBI Infragard Lafayette Chapter. PUBLICATIONS REFEREED JOURNALS Lakhotia/CV Page 3 July 30, 2013 1. Radhouane Chouchane, Natalia Stakhanova, AndrewWalenstein, Arun Lakhotia, Detecting Machine-Morphed Malware Variants via Engine Attribution. Journal in Computer Virology . Springer Paris, to appear. 2. Craig Miles, Arun Lakhotia, and Andrew Walenstein. In Situ Reuse of Logically Extracted Functional Components. Journal in Computer Virology . Springer Paris, 8 (3): 73-84. DOI: 10.1007/s11416-012-0167-y. 3. Kemal Efe, Alp V. Asutay, Arun Lakhotia: Exploring Web Neighbours in Exploratory Search. IJWIS 7(2): 152-182 (2011). 4. Arun Lakhotia, Davidson R. Boccardo, Anshuman Singh, Aleardo Manacero Jr.: Context- sensitive analysis without calling-context. Higher-Order and Symbolic Computation 23 (3): 275-313 (2010). 5. M. Hayes, A. Walenstein, and A. Lakhotia. Evaluation of Malware Phylogeny Modelling Systems using Automated Variant Generation. Journal in Computer Virology , Springer, July 2008. DOI: 10.1007/s11416-008-0100-6. 6. A. Walenstein, R. Mathur, M. Chouchane, A. Lakhotia. Constructing Malware Normalizers Using Term Rewriting. Journal in Computer Virology , 2008. 4(4), Nov. 2008. pp. 307-322. DOI: 10.1007/s11416-008-0081-5. 7. J. Herpin, A. Fekih, S. Golconda, and A. Lakhotia. Steering Control of the Autonomous Vehicle: CajunBot, Journal of Aerospace Computing, Information, and Communication, 4 (12), 2007, 1134-1142, DOI: 10.2514/1.35050. 8. A. Lakhotia, et al. “CajunBot: Architecture and Algorithms,” Journal of Field Robotics , 23 (8), 2006, 555-578, DOI: 10.1002/rob.20129. 9. A. Maida, S. Golconda, P. Mejia, A. Lakhotia, and C. Cavanaugh, “Subgoal-based local navigation and obstacle avoidance using a grid-distance field,” International Journal of Vehicle Autonomous Systems (IJVAS) 4 (2-4), 2006, pp. 122-142. DOI: 10.1504/IJVAS.2006.012203. 10. A. Lakhotia, E. U. Kumar, and M. Venable, “A Method for Detecting Obfuscated Calls in Malicious Binaries,” IEEE Transactions on Software Engineering , 31 (11), November 2005, pp. 955-968. 11. M. Karim, A. Walenstein, A. Lakhotia, and L. Parida, "Malware Phylogeny Generation using Permutations of Code," Journal of Computer Virology , Springer-Verlag, 1, 2005, pp. 13-23. 12. M. Harman, A. Lakhotia, and D. Binkley, "Theory and Algorithms for Slicing Unstructured Programs," Journal

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us