September 2024
·
11 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
September 2024
·
11 Reads
February 2024
·
16 Reads
·
3 Citations
December 2020
·
19 Reads
·
14 Citations
November 2020
·
13 Reads
·
7 Citations
... By contrast, DISASLLM also computes such probability but DISASLLM relies on LLM-based approach instead of any heuristic. The disassembler of SAFER [59] also leverages a probability-based approach combined with static analysis using a prioritized error correction algorithm. XDA [57] pretrained an encoder transformer with dataset of byte sequences in the compiled binaries, using masked token prediction as the training objective, which was then fine-tuned for instruction address identification. ...
February 2024
... In addition to proprietary software that may only be available in binary form, most Linux software is distributed in binary form, thus making binary instrumentation very attractive even for opensource software. These factors have prompted a great deal of research in binary analysis and instrumentation techniques in recent years [3,5,12,14,17,29,41,50,51,54,55,57,58,62]. ...
December 2020
... Many prior works [15,19,21,31] rely on additional compiler-generated information that is unavailable in stripped binaries, such as the symbol table. Recent works have shown [37,40] that exception-handling metadata can be used to accurately identify functions. Many tools such as GHIDRA [44] and JIMA [2] also rely on exception-handling metadata. ...
November 2020