MalLoc: Toward Fine-grained Android Malicious Payload Localization via LLMs Authors: Tiezhu Sun, Marco Alecci, Aleksandr Pilgun, Yewei Song, Xunzhu Tang, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-08-25 Program Analysisマルウェア分析マルチエージェントシステム 2025.08.25 2025.08.27 Literature Database
An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu | Published: 2025-04-30 Program AnalysisPrompt InjectionPrompt leaking 2025.04.30 2025.05.27 Literature Database
LASHED: LLMs And Static Hardware Analysis for Early Detection of RTL Bugs Authors: Baleegh Ahmad, Hammond Pearce, Ramesh Karri, Benjamin Tan | Published: 2025-04-30 Program AnalysisPrompt InjectionVulnerability detection 2025.04.30 2025.05.27 Literature Database
Padding Matters — Exploring Function Detection in PE Files Authors: Raphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban, Christian Dietrich | Published: 2025-04-30 PE Malware ClassificationProgram AnalysisFunction Boundary Pair Formation 2025.04.30 2025.05.27 Literature Database
Secure Coding with AI, From Creation to Inspection Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29 Dataset ApplicabilityProgram AnalysisVulnerability Management 2025.04.29 2025.05.27 Literature Database
Can LLMs Handle WebShell Detection? Overcoming Detection Challenges with Behavioral Function-Aware Framework Authors: Feijiang Han, Jiaming Zhang, Chuyi Deng, Jianheng Tang, Yunhuai Liu | Published: 2025-04-14 | Updated: 2025-08-26 Data Generation MethodProgram AnalysisPrompt leaking 2025.04.14 2025.08.28 Literature Database
Fast, Fine-Grained Equivalence Checking for Neural Decompilers Authors: Luke Dramko, Claire Le Goues, Edward J. Schwartz | Published: 2025-01-08 Program AnalysisControl Dependency OrderingEquivalence Evaluation 2025.01.08 2025.05.27 Literature Database
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts Authors: Che Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen | Published: 2024-09-15 Smart ContractProgram AnalysisAutomated Vulnerability Remediation 2024.09.15 2025.05.27 Literature Database
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification Authors: Zeqing Qin, Yiwei Wu, Lansheng Han | Published: 2024-09-11 LLM Performance EvaluationProgram AnalysisPrompt Injection 2024.09.11 2025.05.27 Literature Database
Comment on Revisiting Neural Program Smoothing for Fuzzing Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06 WatermarkingProgram AnalysisEvaluation Method 2024.09.06 2025.05.27 Literature Database