Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
malware, ransomware, trojan, sandbox analysis, threat intel
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
3171
posts in
14.5
ms
TraceScope
: Interactive URL Triage via Decoupled Checklist
Adjudication
⛓️
ROP Chains
arxiv.org
·
6d
Constraint-Guided Multi-Agent
Decompilation
for
Executable
Binary Recovery
📜
Decompilation
arxiv.org
·
2d
Incisor
: Ex Ante Cloud Instance Selection for
HPC
Jobs
🛡️
Exploit Mitigations
arxiv.org
·
2d
CrossCommitVuln-Bench
: A Dataset of
Multi-Commit
Python Vulnerabilities Invisible to
Per-Commit
Static Analysis
⚡
JIT Exploitation
arxiv.org
·
6d
Trace
Mutation
in Human-LLM Dialogue: The Transcript as
Forensic
and Mitigation Surface
🔍
Memory Forensics
arxiv.org
·
2d
Measuring the
Unmeasurable
:
Markov
Chain Reliability for LLM Agents
✅
Formal Verification
arxiv.org
·
2d
Cross-Session
Threats in AI Agents: Benchmark, Evaluation, and
Algorithms
🛡️
Exploit Mitigations
arxiv.org
·
6d
Empowering
Autonomous
Debugging
Agents with Efficient Dynamic Analysis
⚡
JIT Exploitation
arxiv.org
·
2d
FinGround
: Detecting and
Grounding
Financial Hallucinations via Atomic Claim Verification
🔍
Memory Forensics
arxiv.org
·
2d
CRED-1
: An Open Multi-Signal Domain Credibility Dataset for Automated
Pre-Bunking
of Online Misinformation
🎯
Taint Analysis
arxiv.org
·
6d
GoAT-X
: A Graph of
Auditing
Thoughts for Securing Token Transactions in Cross-Chain Contracts
⛓️
ROP Chains
arxiv.org
·
2d
Mono2Sls
: Automated
Monolith-to-Serverless
Migration via Multi-Stage Pipeline with Static Analysis
🔣
Type Systems
arxiv.org
·
2d
LaissezCloud
: Continuous Resource
Renegotiation
for the Public Cloud
💀
Heap Exploitation
arxiv.org
·
3d
DV-World
: Benchmarking Data
Visualization
Agents in Real-World Scenarios
🌊
Dataflow Analysis
arxiv.org
·
1d
Unsupervised
Learning of Inter-Object Relationships via Group
Homomorphism
🔣
Type Systems
arxiv.org
·
6d
ReTokSync
:
Self-Synchronizing
Tokenization Disambiguation for Generative Linguistic Steganography
🧩
Intermediate Representation
arxiv.org
·
1d
Faithful
Autoformalization
via
Roundtrip
Verification and Repair
✅
Formal Verification
arxiv.org
·
1d
Less Is More: Measuring How LLM
Involvement
affects
Chatbot Accuracy in Static Analysis
⚡
JIT Exploitation
arxiv.org
·
6d
Break the
Inaccessible
Boundary:
Distilling
Post-Conversion Content for User Retention Modeling
🧩
Intermediate Representation
arxiv.org
·
1d
Assessing the Impact of
Requirement
Ambiguity
on LLM-based Function-Level Code Generation
⚙️
Compilers
arxiv.org
·
6d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help