Login / Signup

Disassembling Obfuscated Executables with LLM.

Huanyao RongYue DuanHang ZhangXiaoFeng WangHongbo ChenShengchen DuanShen Wang
Published in: CoRR (2024)
Keyphrases
  • reverse engineering
  • malicious executables
  • malware detection
  • source code
  • static analysis
  • data analysis
  • malicious code
  • database
  • data mining
  • reinforcement learning
  • object oriented
  • spam filters