Login / Signup
Assessing LLMs in Malicious Code Deobfuscation of Real-world Malware Campaigns.
Constantinos Patsakis
Fran Casino
Nikolaos Lykousas
Published in:
CoRR (2024)
Keyphrases
</>
malicious code
real world
static analysis
reverse engineering
network traffic
wide range
malicious behavior
data sets
case study
synthetic data
social media
source code
object recognition
dynamic analysis
data mining
relational databases
information systems