Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔄 Reverse Engineering
RE, disassembly, decompilation, IDA Pro, Ghidra
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
2642
posts in
7.6
ms
LLM4CodeRE
: Generative AI for Code
Decompilation
Analysis and Reverse Engineering
💾
Binary Analysis
arxiv.org
·
2d
Can LLMs
Deobfuscate
Binary Code? A Systematic Analysis of Large Language Models into
Pseudocode
Deobfuscation
💾
Binary Analysis
arxiv.org
·
11h
Dependency-Guided
Repository-Level
C-to-Rust Translation with Reinforcement Alignment
🖥️
Interpreters
arxiv.org
·
4d
Towards Counterfactual Explanation and
Assertion
Inference for
CPS
Debugging
🔀
Concolic Execution
arxiv.org
·
11h
ExplainFuzz
: Explainable and
Constraint-Conditioned
Test Generation with Probabilistic Circuits
🔀
Concolic Execution
arxiv.org
·
1d
When Equality Fails as a Rewrite Principle:
Provenance
and
Definedness
for Measurement-Bearing Expressions
🔣
Type Systems
arxiv.org
·
11h
Automated Malware Family Classification using
Weighted
Hierarchical
Ensembles
of Large Language Models
💾
Binary Analysis
arxiv.org
·
4d
Accurate
Residues
for
Floating-Point
Debugging
💾
Binary Analysis
arxiv.org
·
1d
Figures as
Interfaces
: Toward LLM-Native
Artifacts
for Scientific Discovery
🔣
Type Systems
arxiv.org
·
11h
AutoSOTA
: An End-to-End
Automated
Research System for State-of-the-Art AI Model Discovery
🔣
Type Systems
arxiv.org
·
2d
Guardian-as-an-Advisor
: Advancing Next-Generation Guardian Models for
Trustworthy
LLMs
🧩
Intermediate Representation
arxiv.org
·
11h
ChatSVA
: Bridging
SVA
Generation for Hardware Verification via Task-Specific LLMs
✅
Formal Verification
arxiv.org
·
4d
BodhiPromptShield
: Pre-Inference Prompt Mediation for
Suppressing
Privacy Propagation in LLM/VLM Agents
🐧
Kernel Exploitation
arxiv.org
·
2d
HCRE
: LLM-based Hierarchical Classification for Cross-Document
Relation
Extraction with a Prediction-then-Verification Strategy
🧩
Intermediate Representation
arxiv.org
·
11h
DeepFense
: A Unified, Modular, and
Extensible
Framework for Robust Deepfake Audio Detection
🎲
Fuzzing
arxiv.org
·
11h
fastml
: Guarded
Resampling
Workflows for Safer Automated Machine Learning in R
🎲
Fuzzing
arxiv.org
·
2d
Drift-Based
Policy Optimization:
Native
One-Step Policy Learning for Online Robot Control
🔣
Type Systems
arxiv.org
·
3d
From LLM to Silicon:
RL-Driven
ASIC
Architecture Exploration for On-Device AI Inference
🔌
Hardware Security
arxiv.org
·
11h
In Depth We Trust: Reliable
Monocular
Depth
Supervision
for Gaussian Splatting
🔣
Type Systems
arxiv.org
·
2d
DeepStack
: Scalable and Accurate Design Space Exploration for Distributed 3D-Stacked AI
Accelerators
🔌
Hardware Security
arxiv.org
·
3d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help