An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu | Published: 2025-04-30 Program AnalysisPrompt InjectionPrompt leaking 2025.04.30 2025.05.27 Literature Database
LASHED: LLMs And Static Hardware Analysis for Early Detection of RTL Bugs Authors: Baleegh Ahmad, Hammond Pearce, Ramesh Karri, Benjamin Tan | Published: 2025-04-30 Program AnalysisPrompt InjectionVulnerability detection 2025.04.30 2025.05.27 Literature Database
Padding Matters — Exploring Function Detection in PE Files Authors: Raphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban, Christian Dietrich | Published: 2025-04-30 PE Malware ClassificationProgram AnalysisFunction Boundary Pair Formation 2025.04.30 2025.05.27 Literature Database
Secure Coding with AI, From Creation to Inspection Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29 Dataset ApplicabilityProgram AnalysisVulnerability Management 2025.04.29 2025.05.27 Literature Database
Fast, Fine-Grained Equivalence Checking for Neural Decompilers Authors: Luke Dramko, Claire Le Goues, Edward J. Schwartz | Published: 2025-01-08 Program AnalysisControl Dependency OrderingEquivalence Evaluation 2025.01.08 2025.05.27 Literature Database
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts Authors: Che Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen | Published: 2024-09-15 Smart ContractProgram AnalysisAutomated Vulnerability Remediation 2024.09.15 2025.05.27 Literature Database
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification Authors: Zeqing Qin, Yiwei Wu, Lansheng Han | Published: 2024-09-11 LLM Performance EvaluationProgram AnalysisPrompt Injection 2024.09.11 2025.05.27 Literature Database
Comment on Revisiting Neural Program Smoothing for Fuzzing Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06 WatermarkingProgram AnalysisEvaluation Method 2024.09.06 2025.05.27 Literature Database
The Role of Transformer Models in Advancing Blockchain Technology: A Systematic Survey Authors: Tianxu Liu, Yanbin Wang, Jianguo Sun, Ye Tian, Yanyu Huang, Tao Xue, Peiyue Li, Yiwei Liu | Published: 2024-09-02 | Updated: 2024-09-05 Smart ContractProgram AnalysisBlockchain Technology 2024.09.02 2025.05.27 Literature Database
Harnessing the Power of LLMs in Source Code Vulnerability Detection Authors: Andrew A Mahyari | Published: 2024-08-07 LLM Performance EvaluationProgram AnalysisVulnerability Management 2024.08.07 2025.05.27 Literature Database