Login / Signup
Disassembling Obfuscated Executables with LLM.
Huanyao Rong
Yue Duan
Hang Zhang
XiaoFeng Wang
Hongbo Chen
Shengchen Duan
Shen Wang
Published in:
CoRR (2024)
Keyphrases
</>
reverse engineering
malicious executables
malware detection
source code
static analysis
data analysis
malicious code
database
data mining
reinforcement learning
object oriented
spam filters