Ryutaro Nishizaka, Yudai Fujiwara, Takuya Shimizu, Kazushi Kato, Yuichi Sugiyama (Ricerca Security, Inc.)
Towards LLM-Resistant Software Protection: Agent Failure Patterns in CTF Reverse Engineering
View More Papers
Beyond the C: Retargetable Decompilation using Neural Machine Translation
Iman Hosseini, Brendan Dolan-Gavitt (NYU)
Read MorePrivacy Starts with UI: Privacy Patterns and Designer Perspectives...
Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)
Read MorePerformance, Correctness, Exceptions: Pick Three
Andrea Gussoni (Politecnico di Milano), Alessandro Di Federico (Politecnico di Milano), Pietro Fezzardi (Politecnico di Milano), Giovanni Agosta (Politecnico di Milano)
Read More