Ahmed Mostafa, Raisul Arefin Nahid, Samuel Mulder (Auburn University)
How Different Tokenization Algorithms Impact LLMs and Transformer Models for Binary Code Analysis
View More Papers
Detecting Obfuscated Function Clones in Binaries using Machine Learning
Michael Pucher (University of Vienna), Christian Kudera (SBA Research), Georg Merzdovnik (SBA Research)
Read MoreLeakLess: Selective Data Protection against Memory Leakage Attacks for...
Maryam Rostamipoor (Stony Brook University), Seyedhamed Ghavamnia (University of Connecticut), Michalis Polychronakis (Stony Brook University)
Read MoreRAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial...
Dzung Pham (University of Massachusetts Amherst), Shreyas Kulkarni (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst)
Read MoreBeyond Classification: Inferring Function Names in Stripped Binaries via...
Linxi Jiang (The Ohio State University), Xin Jin (The Ohio State University), Zhiqiang Lin (The Ohio State University)
Read More