Decompiling Smart Contracts with a Large Language Model Authors: Isaac David, Liyi Zhou, Dawn Song, Arthur Gervais, Kaihua Qin | Published: 2025-06-24 デコンパイルの課題バイナリ分析Vulnerability Research 2025.06.24 2025.06.26 Literature Database
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes Authors: Pasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni | Published: 2025-06-24 バイナリ分析Detection Rate of Phishing AttacksVulnerability Research 2025.06.24 2025.06.26 Literature Database
ReCopilot: Reverse Engineering Copilot in Binary Analysis Authors: Guoqiang Chen, Huiqi Sun, Daguang Liu, Zhiqi Wang, Qiang Wang, Bin Yin, Lu Liu, Lingyun Ying | Published: 2025-05-22 Alignmentバイナリ分析Dynamic Analysis 2025.05.22 2025.05.28 Literature Database
On the Lack of Robustness of Binary Function Similarity Systems Authors: Gianluca Capozzi, Tong Tang, Jie Wan, Ziqi Yang, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Lorenzo Cavallaro, Leonardo Querzoni | Published: 2024-12-05 | Updated: 2025-05-22 バイナリ分析Adversarial LearningAdversarial Learning 2024.12.05 2025.05.28 Literature Database