Ryutaro Nishizaka, Yudai Fujiwara, Takuya Shimizu, Kazushi Kato, Yuichi Sugiyama (Ricerca Security, Inc.)
Towards LLM-Resistant Software Protection: Agent Failure Patterns in CTF Reverse Engineering
View More Papers
Bangr: Binary Ninja + angr
Kevan Baker, Daniel R. Tauritz, Samuel Mulder (Auburn University)
Read MoreVeriLoRA: Fine-Tuning Large Language Models with Verifiable Security via...
Guofu Liao (Shenzhen University), Taotao Wang (Shenzhen University), Shengli Zhang (Shenzhen University), Jiqun Zhang (Shenzhen University), Long Shi (Nanjing University of Science and Technology), Dacheng Tao (Nanyang Technological University)
Read MoreReFuzz: Reusing Tests for Processor Fuzzing with Contextual Bandits
Chen Chen (Texas A&M University, USA), Zaiyan Xu (Texas A&M University, USA), Mohamadreza Rostami (Technische Universitat Darmstadt, Germany), David Liu (Texas A&M University, USA), Dileep Kalathil (Texas A&M University, USA), Ahmad-Reza Sadeghi (Technische Universitat Darmstadt, Germany), Jeyavijayan (JV) Rajendran (Texas A&M University, USA)
Read More