Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎲 Fuzzing
fuzzer, AFL, libFuzzer, coverage-guided fuzzing, crash triage
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
2642
posts in
56.9
ms
Improving Random Testing via LLM-powered UI
Tarpit
Escaping
for Mobile Apps
📟
Firmware Analysis
arxiv.org
·
1d
VCAO
:
Verifier-Centered
Agentic Orchestration for Strategic OS Vulnerability Discovery
🐧
Kernel Exploitation
arxiv.org
·
6h
BugForge
: Constructing and Utilizing
DBMS
Bug Repository to Enhance
DBMS
Testing
🔀
Concolic Execution
arxiv.org
·
4d
Program Analysis Guided LLM Agent for
Proof-of-Concept
Generation
✅
Formal Verification
arxiv.org
·
6h
FLARE
: Agentic Coverage-Guided
Fuzzing
for LLM-Based Multi-Agent Systems
✅
Formal Verification
arxiv.org
·
2d
GBQA
: A Game Benchmark for Evaluating LLMs as Quality
Assurance
Engineers
🔀
Concolic Execution
arxiv.org
·
4d
Content
Fuzzing
for Escaping Information
Cocoons
on Digital Social Media
🌐
Protocol Fuzzing
arxiv.org
·
2d
Guiding
Symbolic
Execution with Static Analysis and LLMs for Vulnerability Discovery
🧮
Symbolic Execution
arxiv.org
·
1d
A Multi-Agent Framework for Automated Exploit Generation with
Constraint-Guided
Comprehension
and Reflection
🛡️
Exploit Mitigations
arxiv.org
·
2d
Multi-modal
user
interface
control detection using cross-attention
🧩
Intermediate Representation
arxiv.org
·
1d
Towards Counterfactual Explanation and
Assertion
Inference for
CPS
Debugging
🔀
Concolic Execution
arxiv.org
·
6h
Can LLMs
Deobfuscate
Binary Code? A Systematic Analysis of Large Language Models into
Pseudocode
Deobfuscation
💾
Binary Analysis
arxiv.org
·
6h
Cross-Tokenizer
LLM Distillation through a
Byte-Level
Interface
🧩
Intermediate Representation
arxiv.org
·
6h
PAFT
:
Preservation
Aware Fine-Tuning for Minimal-Edit Program Repair
🛡️
Exploit Mitigations
arxiv.org
·
4d
An
Empirical
Analysis of Static Analysis Methods for Detection and Mitigation of Code Library
Hallucinations
🛡️
Exploit Mitigations
arxiv.org
·
6h
Towards Identification and
Intervention
of Safety-Critical
Parameters
in Large Language Models
🛡️
Exploit Mitigations
arxiv.org
·
6h
Backup-Based Safety Filters: A Comparative Review of Backup CBF, Model Predictive
Shielding
, and
gatekeeper
🔒
CFI
arxiv.org
·
4d
ExplainFuzz
: Explainable and
Constraint-Conditioned
Test Generation with Probabilistic Circuits
🔀
Concolic Execution
arxiv.org
·
1d
A
Comparative
Study of Semantic Log
Representations
for Software Log-based Anomaly Detection
💾
Binary Analysis
arxiv.org
·
6h
Awakening the Sleeping Agent: Lean-Specific Agentic Data
Reactivates
General Tool Use in
Goedel
Prover
✅
Formal Verification
arxiv.org
·
6h
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help