[HTML][HTML] Synthesizing research on programmers' mental models of programs, tasks and concepts—A systematic literature review

A Heinonen, B Lehtelä, A Hellas… - Information and Software …, 2023 - Elsevier
Context: Programmers' mental models represent their knowledge and understanding of
programs, programming concepts, and programming in general. They guide programmers' …

Binary code summarization: Benchmarking chatgpt/gpt-4 and other large language models

X **, J Larson, W Yang, Z Lin - arxiv preprint arxiv:2312.09601, 2023 - arxiv.org
Binary code summarization, while invaluable for understanding code semantics, is
challenging due to its labor-intensive nature. This study delves into the potential of large …

Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets

J Gray, D Sgandurra, L Cavallaro… - ACM Computing …, 2024 - dl.acm.org
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …

Extending source code pre-trained language models to summarise decompiled binaries

A Al-Kaswan, T Ahmed, M Izadi… - … on Software Analysis …, 2023 - ieeexplore.ieee.org
Binary reverse engineering is used to understand and analyse programs for which the
source code is unavailable. Decompilers can help, transforming opaque binaries into a …

Self-supervised vision transformers for malware detection

S Seneviratne, R Shariffdeen, S Rasnayaka… - IEEE …, 2022 - ieeexplore.ieee.org
Malware detection plays a crucial role in cyber-security with the increase in malware growth
and advancements in cyber-attacks. Previously unseen malware which is not determined by …

Motif: A malware reference dataset with ground truth family labels

RJ Joyce, D Amlani, C Nicholas, E Raff - Computers & Security, 2023 - Elsevier
Malware family classification is a significant issue with public safety and research
implications that has been hindered by the high cost of expert labels. The vast majority of …

An inside look into the practice of malware analysis

M Yong Wong, M Landen, M Antonakakis… - Proceedings of the …, 2021 - dl.acm.org
Malware analysis aims to understand how malicious software carries out actions necessary
for a successful attack and identify the possible impacts of the attack. While there has been …

Classifying sequences of extreme length with constant memory applied to malware detection

E Raff, W Fleshman, R Zak, HS Anderson… - Proceedings of the …, 2021 - ojs.aaai.org
Recent works within machine learning have been tackling inputs of ever increasing size,
with cyber security presenting sequence classification problems of particularly extreme …

Neural reverse engineering of stripped binaries using augmented control flow graphs

Y David, U Alon, E Yahav - Proceedings of the ACM on Programming …, 2020 - dl.acm.org
We address the problem of reverse engineering of stripped executables, which contain no
debug information. This is a challenging problem because of the low amount of syntactic …

[PDF][PDF] LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks

S Ullah, M Han, S Pujar, H Pearce, A Coskun… - arxiv preprint arxiv …, 2023 - bu.edu
Large Language Models (LLMs) have been suggested for use in automated vulnerability
repair, but benchmarks showing they can consistently identify security-related bugs are …