Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💾 Binary Analysis
binary exploitation, ELF, PE format, angr, binary ninja
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
3171
posts in
13.1
ms
SeqShield
: A Behavioral Analysis Approach to Uncover
Rootkits
🦠
Malware Analysis
arxiv.org
·
2d
Adversarial Malware Generation in Linux ELF
Binaries
via Semantic-Preserving
Transformations
🛡️
Exploit Mitigations
arxiv.org
·
3d
Constraint-Guided Multi-Agent
Decompilation
for
Executable
Binary Recovery
📜
Decompilation
arxiv.org
·
2d
Less Is More: Measuring How LLM
Involvement
affects
Chatbot Accuracy in Static Analysis
⚡
JIT Exploitation
arxiv.org
·
6d
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
🐧
Kernel Exploitation
arxiv.org
·
2d
GoAT-X
: A Graph of
Auditing
Thoughts for Securing Token Transactions in Cross-Chain Contracts
⛓️
ROP Chains
arxiv.org
·
2d
CrossCommitVuln-Bench
: A Dataset of
Multi-Commit
Python Vulnerabilities Invisible to
Per-Commit
Static Analysis
⚡
JIT Exploitation
arxiv.org
·
6d
Hybrid
Path-Sums
for Hybrid Quantum
Programs
🧮
Symbolic Execution
arxiv.org
·
2d
Mono2Sls
: Automated
Monolith-to-Serverless
Migration via Multi-Stage Pipeline with Static Analysis
🔣
Type Systems
arxiv.org
·
2d
Incisor
: Ex Ante Cloud Instance Selection for
HPC
Jobs
🛡️
Exploit Mitigations
arxiv.org
·
2d
eDySec
: A Deep Learning-based Explainable Dynamic Analysis Framework for Detecting Malicious Packages in
PyPI
Ecosystem
📟
Firmware Analysis
arxiv.org
·
21h
Beyond Code Reasoning: A
Specification-Anchored
Audit Framework for Expert-Augmented Security Verification
✅
Formal Verification
arxiv.org
·
21h
Recipes
for
Calibration
Checks in Safety-Critical Applications
🎲
Fuzzing
arxiv.org
·
21h
GenDetect
: Generalizing Reactive Detection for Resilience Against
Imitative
DeFi Attack Cascade
🛡️
Exploit Mitigations
arxiv.org
·
21h
VulStyle
: A Multi-Modal Pre-Training for Code
Stylometry-Augmented
Vulnerability Detection
⚡
JIT Exploitation
arxiv.org
·
21h
Tatemae
: Detecting Alignment
Faking
via Tool Selection in LLMs
🎲
Fuzzing
arxiv.org
·
21h
Inferring
Equivalence Classes from Legacy Undocumented Embedded
Binaries
for ISO 26262-Compliant Testing
🖥️
Emulation
arxiv.org
·
3d
Fast Core
Identification
🔒
CFI
arxiv.org
·
21h
An
Empirical
Study of
Speculative
Decoding on Software Engineering Tasks
⚡
JIT Exploitation
arxiv.org
·
21h
Train in
Vain
:
Functionality-Preserving
Poisoning to Prevent Unauthorized Use of Code Datasets
⚡
JIT Exploitation
arxiv.org
·
3d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help