Skip to main content

Showing 1–2 of 2 results for author: Lakhotia, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14052  [pdf, other

    cs.CR

    Reverse Engineering Structure and Semantics of Input of a Binary Executable

    Authors: Seshagiri Prabhu Narasimha, Arun Lakhotia

    Abstract: Knowledge of the input format of binary executables is important for finding bugs and vulnerabilities, such as generating data for fuzzing or manual reverse engineering. This paper presents an algorithm to recover the structure and semantic relations between fields of the input of binary executables using dynamic taint analysis. The algorithm improves upon prior work by not just partitioning the i… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  2. arXiv:1704.08716  [pdf, other

    cs.CR cs.AI

    Artificial Intelligence Based Malware Analysis

    Authors: Avi Pfeffer, Brian Ruttenberg, Lee Kellogg, Michael Howard, Catherine Call, Alison O'Connor, Glenn Takata, Scott Neal Reilly, Terry Patten, Jason Taylor, Robert Hall, Arun Lakhotia, Craig Miles, Dan Scofield, Jared Frank

    Abstract: Artificial intelligence methods have often been applied to perform specific functions or tasks in the cyber-defense realm. However, as adversary methods become more complex and difficult to divine, piecemeal efforts to understand cyber-attacks, and malware-based attacks in particular, are not providing sufficient means for malware analysts to understand the past, present and future characteristics… ▽ More

    Submitted 27 April, 2017; originally announced April 2017.