Program Analysis

DRsam: Detection of Fault-Based Microarchitectural Side-Channel Attacks in RISC-V Using Statistical Preprocessing and Association Rule Mining

Authors: Muhammad Hassan, Maria Mushtaq, Jaan Raik, Tara Ghasempouri | Published: 2025-10-21
Program Analysis
Feature Extraction
Anomaly Detection Method

Evaluating Large Language Models in detecting Secrets in Android Apps

Authors: Marco Alecci, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-10-21
Program Analysis
Prompt Injection
Information Leakage Analysis

FalseCrashReducer: Mitigating False Positive Crashes in OSS-Fuzz-Gen Using Agentic AI

Authors: Paschal C. Amusuo, Dongge Liu, Ricardo Andres Calvo Mendez, Jonathan Metzman, Oliver Chang, James C. Davis | Published: 2025-10-02
Program Analysis
Prompt Injection
誤検知管理

It’s not Easy: Applying Supervised Machine Learning to Detect Malicious Extensions in the Chrome Web Store

Authors: Ben Rosenzweig, Valentino Dalla Valle, Giovanni Apruzzese, Aurore Fass | Published: 2025-09-25 | Updated: 2025-10-02
Program Analysis
User Activity Analysis
Malicious Package Detection

MalLoc: Toward Fine-grained Android Malicious Payload Localization via LLMs

Authors: Tiezhu Sun, Marco Alecci, Aleksandr Pilgun, Yewei Song, Xunzhu Tang, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-08-25
Program Analysis
マルウェア分析
マルチエージェントシステム

An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding

Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu | Published: 2025-04-30
Program Analysis
Prompt Injection
Prompt leaking

LASHED: LLMs And Static Hardware Analysis for Early Detection of RTL Bugs

Authors: Baleegh Ahmad, Hammond Pearce, Ramesh Karri, Benjamin Tan | Published: 2025-04-30
Program Analysis
Prompt Injection
Vulnerability detection

Padding Matters — Exploring Function Detection in PE Files

Authors: Raphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban, Christian Dietrich | Published: 2025-04-30
PE Malware Classification
Program Analysis
Function Boundary Pair Formation

Secure Coding with AI, From Creation to Inspection

Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29
Dataset Applicability
Program Analysis
Vulnerability Management

Can LLMs Handle WebShell Detection? Overcoming Detection Challenges with Behavioral Function-Aware Framework

Authors: Feijiang Han, Jiaming Zhang, Chuyi Deng, Jianheng Tang, Yunhuai Liu | Published: 2025-04-14 | Updated: 2025-08-26
Data Generation Method
Program Analysis
Prompt leaking