Large language models for code analysis: Do {LLMs} really do their job?

C Fang, N Miao, S Srivastav, J Liu, R Zhang… - 33rd USENIX Security …, 2024 - usenix.org
Large language models (LLMs) have demonstrated significant potential in the realm of
natural language understanding and programming code processing tasks. Their capacity to …

Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024 - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

Simplification of general mixed boolean-arithmetic expressions: Gamba

B Reichenwallner… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Malware code often resorts to various self-protection techniques to complicate analysis. One
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …

Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - arXiv preprint arXiv …, 2023 - arxiv.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

An In‐Place Simplification on Mixed Boolean‐Arithmetic Expressions

B Liu, Q Zheng, J Li, D Xu - Security and Communication …, 2022 - Wiley Online Library
Mixed Boolean‐arithmetic (MBA) expression, which involves both bitwise operations (eg,
NOT, AND, and OR) and arithmetic operations (eg,+,−, and∗), is a software obfuscation …

A Framework to Quantify the Quality of Source Code Obfuscation

H Jin, J Lee, S Yang, K Kim, DH Lee - Applied Sciences, 2024 - mdpi.com
Malicious reverse engineering of software has served as a valuable technique for attackers
to infringe upon and steal intellectual property. We can employ obfuscation techniques to …

Synthesizing MILP Constraints for Efficient and Robust Optimization

J Wang, A Gupta, C Wang - Proceedings of the ACM on Programming …, 2023 - dl.acm.org
While mixed integer linear programming (MILP) solvers are routinely used to solve a wide
range of important science and engineering problems, it remains a challenging task for end …

X-MBA: Towards Heterogeneous Mixed Boolean-Arithmetic Deobfuscation

G Li, M Yu, D Fang, G Li, X Meng… - MILCOM 2024-2024 …, 2024 - ieeexplore.ieee.org
The Mixed Boolean-Arithmetic (MBA) expression has been widely used by attackers as an
effective obfuscation schema to hide malicious code and conceal sensitive data. For …

[PDF][PDF] Obfuscation technologies of high-level source code using artificial intelligence

I Golovko, O Savenko, P Vizhevskyi, O Klein… - Strategies, 2023 - ceur-ws.org
This article provides an in-depth exploration of" Obfuscation Technologies of Source Code,"
focusing on the latest advancements in methodologies to safeguard intellectual property in …

Deobfuscation of Semi-Linear Mixed Boolean-Arithmetic Expressions

C Skees - arXiv preprint arXiv:2406.10016, 2024 - arxiv.org
Mixed Boolean-Arithmetic (MBA) obfuscation is a common technique used to transform
simple expressions into semantically equivalent but more complex combinations of boolean …