Adversarially Robust and Interpretable Magecart Malware Detection Authors: Pedro Pereira, José Gouveia, João Vitorino, Eva Maia, Isabel Praça | Published: 2025-11-06 Dynamic AnalysisAdversarial LearningInterpretability 2025.11.06 2025.11.08 Literature Database
Hybrid Fuzzing with LLM-Guided Input Mutation and Semantic Feedback Authors: Shiyin Lin | Published: 2025-11-06 Prompt InjectionDynamic AnalysisInformation Security 2025.11.06 2025.11.08 Literature Database
Client-Side Zero-Shot LLM Inference for Comprehensive In-Browser URL Analysis Authors: Avihay Cohen | Published: 2025-06-04 AlignmentPrompt InjectionDynamic Analysis 2025.06.04 2025.06.06 Literature Database
ReCopilot: Reverse Engineering Copilot in Binary Analysis Authors: Guoqiang Chen, Huiqi Sun, Daguang Liu, Zhiqi Wang, Qiang Wang, Bin Yin, Lu Liu, Lingyun Ying | Published: 2025-05-22 Alignmentバイナリ分析Dynamic Analysis 2025.05.22 2025.05.28 Literature Database
Adaptive Plan-Execute Framework for Smart Contract Security Auditing Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Zhe Hou, Zixiao Zhao | Published: 2025-05-21 | Updated: 2025-05-22 RAGPrompt leakingDynamic Analysis 2025.05.21 2025.05.28 Literature Database
A Linear Approach to Data Poisoning Authors: Diego Granziol, Donald Flynn | Published: 2025-05-21 PoisoningDynamic AnalysisStatistical Analysis 2025.05.21 2025.05.28 Literature Database
A Sysmon Incremental Learning System for Ransomware Analysis and Detection Authors: Jamil Ispahany, MD Rafiqul Islam, M. Arif Khan, MD Zahidul Islam | Published: 2025-01-02 Online LearningDynamic Analysis 2025.01.02 2025.05.27 Literature Database
A Lean Transformer Model for Dynamic Malware Analysis and Detection Authors: Tony Quertier, Benjamin Marais, Grégoire Barrué, Stéphane Morucci, Sévan Azé, Sébastien Salladin | Published: 2024-08-05 Malware ClassificationDynamic Analysis 2024.08.05 2025.05.27 Literature Database
Explainability-Informed Targeted Malware Misclassification Authors: Quincy Card, Kshitiz Aryal, Maanak Gupta | Published: 2024-05-07 PoisoningMalware ClassificationDynamic Analysis 2024.05.07 2025.05.27 Literature Database
Harnessing the Power of LLM to Support Binary Taint Analysis Authors: Puzhuo Liu, Chengnian Sun, Yaowen Zheng, Xuan Feng, Chuan Qin, Yuncheng Wang, Zhenyang Xu, Zhi Li, Peng Di, Yu Jiang, Limin Sun | Published: 2023-10-12 | Updated: 2025-01-09 Security AnalysisPrompting StrategyDynamic Analysis 2023.10.12 2025.05.28 Literature Database