[HTML][HTML] Synthesizing research on programmers' mental models of programs, tasks and concepts—A systematic literature review
A Heinonen, B Lehtelä, A Hellas… - Information and Software …, 2023 - Elsevier
Context: Programmers' mental models represent their knowledge and understanding of
programs, programming concepts, and programming in general. They guide programmers' …
programs, programming concepts, and programming in general. They guide programmers' …
Binary code summarization: Benchmarking chatgpt/gpt-4 and other large language models
Binary code summarization, while invaluable for understanding code semantics, is
challenging due to its labor-intensive nature. This study delves into the potential of large …
challenging due to its labor-intensive nature. This study delves into the potential of large …
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
Extending source code pre-trained language models to summarise decompiled binaries
Binary reverse engineering is used to understand and analyse programs for which the
source code is unavailable. Decompilers can help, transforming opaque binaries into a …
source code is unavailable. Decompilers can help, transforming opaque binaries into a …
Self-supervised vision transformers for malware detection
Malware detection plays a crucial role in cyber-security with the increase in malware growth
and advancements in cyber-attacks. Previously unseen malware which is not determined by …
and advancements in cyber-attacks. Previously unseen malware which is not determined by …
Motif: A malware reference dataset with ground truth family labels
Malware family classification is a significant issue with public safety and research
implications that has been hindered by the high cost of expert labels. The vast majority of …
implications that has been hindered by the high cost of expert labels. The vast majority of …
An inside look into the practice of malware analysis
Malware analysis aims to understand how malicious software carries out actions necessary
for a successful attack and identify the possible impacts of the attack. While there has been …
for a successful attack and identify the possible impacts of the attack. While there has been …
Classifying sequences of extreme length with constant memory applied to malware detection
Recent works within machine learning have been tackling inputs of ever increasing size,
with cyber security presenting sequence classification problems of particularly extreme …
with cyber security presenting sequence classification problems of particularly extreme …
Neural reverse engineering of stripped binaries using augmented control flow graphs
We address the problem of reverse engineering of stripped executables, which contain no
debug information. This is a challenging problem because of the low amount of syntactic …
debug information. This is a challenging problem because of the low amount of syntactic …
[PDF][PDF] LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks
Large Language Models (LLMs) have been suggested for use in automated vulnerability
repair, but benchmarks showing they can consistently identify security-related bugs are …
repair, but benchmarks showing they can consistently identify security-related bugs are …