DRsam: Detection of Fault-Based Microarchitectural Side-Channel Attacks in RISC-V Using Statistical Preprocessing and Association Rule Mining Authors: Muhammad Hassan, Maria Mushtaq, Jaan Raik, Tara Ghasempouri | Published: 2025-10-21 Program AnalysisFeature ExtractionAnomaly Detection Method 2025.10.21 2025.10.23 Literature Database
Evaluating Large Language Models in detecting Secrets in Android Apps Authors: Marco Alecci, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-10-21 Program AnalysisPrompt InjectionInformation Leakage Analysis 2025.10.21 2025.10.23 Literature Database
FalseCrashReducer: Mitigating False Positive Crashes in OSS-Fuzz-Gen Using Agentic AI Authors: Paschal C. Amusuo, Dongge Liu, Ricardo Andres Calvo Mendez, Jonathan Metzman, Oliver Chang, James C. Davis | Published: 2025-10-02 Program AnalysisPrompt Injection誤検知管理 2025.10.02 2025.10.04 Literature Database
It’s not Easy: Applying Supervised Machine Learning to Detect Malicious Extensions in the Chrome Web Store Authors: Ben Rosenzweig, Valentino Dalla Valle, Giovanni Apruzzese, Aurore Fass | Published: 2025-09-25 | Updated: 2025-10-02 Program AnalysisUser Activity AnalysisMalicious Package Detection 2025.09.25 2025.10.04 Literature Database
MalLoc: Toward Fine-grained Android Malicious Payload Localization via LLMs Authors: Tiezhu Sun, Marco Alecci, Aleksandr Pilgun, Yewei Song, Xunzhu Tang, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-08-25 Program Analysisマルウェア分析マルチエージェントシステム 2025.08.25 2025.08.27 Literature Database
An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu | Published: 2025-04-30 Program AnalysisPrompt InjectionPrompt leaking 2025.04.30 2025.05.27 Literature Database
LASHED: LLMs And Static Hardware Analysis for Early Detection of RTL Bugs Authors: Baleegh Ahmad, Hammond Pearce, Ramesh Karri, Benjamin Tan | Published: 2025-04-30 Program AnalysisPrompt InjectionVulnerability detection 2025.04.30 2025.05.27 Literature Database
Padding Matters — Exploring Function Detection in PE Files Authors: Raphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban, Christian Dietrich | Published: 2025-04-30 PE Malware ClassificationProgram AnalysisFunction Boundary Pair Formation 2025.04.30 2025.05.27 Literature Database
Secure Coding with AI, From Creation to Inspection Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29 Dataset ApplicabilityProgram AnalysisVulnerability Management 2025.04.29 2025.05.27 Literature Database
Can LLMs Handle WebShell Detection? Overcoming Detection Challenges with Behavioral Function-Aware Framework Authors: Feijiang Han, Jiaming Zhang, Chuyi Deng, Jianheng Tang, Yunhuai Liu | Published: 2025-04-14 | Updated: 2025-08-26 Data Generation MethodProgram AnalysisPrompt leaking 2025.04.14 2025.08.28 Literature Database