Program Analysis

An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding

Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu | Published: 2025-04-30
Program Analysis
Prompt Injection
Prompt leaking

LASHED: LLMs And Static Hardware Analysis for Early Detection of RTL Bugs

Authors: Baleegh Ahmad, Hammond Pearce, Ramesh Karri, Benjamin Tan | Published: 2025-04-30
Program Analysis
Prompt Injection
Vulnerability detection

Padding Matters — Exploring Function Detection in PE Files

Authors: Raphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban, Christian Dietrich | Published: 2025-04-30
PE Malware Classification
Program Analysis
Function Boundary Pair Formation

Secure Coding with AI, From Creation to Inspection

Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29
Dataset Applicability
Program Analysis
Vulnerability Management

Fast, Fine-Grained Equivalence Checking for Neural Decompilers

Authors: Luke Dramko, Claire Le Goues, Edward J. Schwartz | Published: 2025-01-08
Program Analysis
Control Dependency Ordering
Equivalence Evaluation

ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts

Authors: Che Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen | Published: 2024-09-15
Smart Contract
Program Analysis
Automated Vulnerability Remediation

CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification

Authors: Zeqing Qin, Yiwei Wu, Lansheng Han | Published: 2024-09-11
LLM Performance Evaluation
Program Analysis
Prompt Injection

Comment on Revisiting Neural Program Smoothing for Fuzzing

Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06
Watermarking
Program Analysis
Evaluation Method

The Role of Transformer Models in Advancing Blockchain Technology: A Systematic Survey

Authors: Tianxu Liu, Yanbin Wang, Jianguo Sun, Ye Tian, Yanyu Huang, Tao Xue, Peiyue Li, Yiwei Liu | Published: 2024-09-02 | Updated: 2024-09-05
Smart Contract
Program Analysis
Blockchain Technology

Harnessing the Power of LLMs in Source Code Vulnerability Detection

Authors: Andrew A Mahyari | Published: 2024-08-07
LLM Performance Evaluation
Program Analysis
Vulnerability Management