Large language models for code analysis: Do {LLMs} really do their job?
Large language models (LLMs) have demonstrated significant potential in the realm of
natural language understanding and programming code processing tasks. Their capacity to …
natural language understanding and programming code processing tasks. Their capacity to …
Evaluation Methodologies in Software Protection Research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
Simplification of general mixed boolean-arithmetic expressions: Gamba
B Reichenwallner… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Malware code often resorts to various self-protection techniques to complicate analysis. One
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …
Evaluation Methodologies in Software Protection Research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
An In‐Place Simplification on Mixed Boolean‐Arithmetic Expressions
B Liu, Q Zheng, J Li, D Xu - Security and Communication …, 2022 - Wiley Online Library
Mixed Boolean‐arithmetic (MBA) expression, which involves both bitwise operations (eg,
NOT, AND, and OR) and arithmetic operations (eg,+,−, and∗), is a software obfuscation …
NOT, AND, and OR) and arithmetic operations (eg,+,−, and∗), is a software obfuscation …
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers
to infringe upon and steal intellectual property. We can employ obfuscation techniques to …
to infringe upon and steal intellectual property. We can employ obfuscation techniques to …
Synthesizing MILP Constraints for Efficient and Robust Optimization
While mixed integer linear programming (MILP) solvers are routinely used to solve a wide
range of important science and engineering problems, it remains a challenging task for end …
range of important science and engineering problems, it remains a challenging task for end …
X-MBA: Towards Heterogeneous Mixed Boolean-Arithmetic Deobfuscation
The Mixed Boolean-Arithmetic (MBA) expression has been widely used by attackers as an
effective obfuscation schema to hide malicious code and conceal sensitive data. For …
effective obfuscation schema to hide malicious code and conceal sensitive data. For …
[PDF][PDF] Obfuscation technologies of high-level source code using artificial intelligence
I Golovko, O Savenko, P Vizhevskyi, O Klein… - Strategies, 2023 - ceur-ws.org
This article provides an in-depth exploration of" Obfuscation Technologies of Source Code,"
focusing on the latest advancements in methodologies to safeguard intellectual property in …
focusing on the latest advancements in methodologies to safeguard intellectual property in …
Deobfuscation of Semi-Linear Mixed Boolean-Arithmetic Expressions
C Skees - arXiv preprint arXiv:2406.10016, 2024 - arxiv.org
Mixed Boolean-Arithmetic (MBA) obfuscation is a common technique used to transform
simple expressions into semantically equivalent but more complex combinations of boolean …
simple expressions into semantically equivalent but more complex combinations of boolean …