Login / Signup
Assessing LLMs in malicious code deobfuscation of real-world malware campaigns.
Constantinos Patsakis
Fran Casino
Nikolaos Lykousas
Published in:
Expert Syst. Appl. (2024)
Keyphrases
</>
malicious code
real world
static analysis
network traffic
reverse engineering
malicious behavior
wide range
dynamic analysis
synthetic data
data sets
source code
case study
data mining
object oriented
social media
probabilistic model
open source