Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎯 Taint Analysis
Specific
taint tracking, data flow, information flow, dynamic taint
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
3171
posts in
19.7
ms
Ghost
in the Agent:
Redefining
Information Flow Tracking for LLM Agents
🛡️
Exploit Mitigations
arxiv.org
·
2d
Process-Mining of
Hypertraces
: Enabling Scalable Formal Security Verification of (Automotive) Network
Architectures
✅
Formal Verification
arxiv.org
·
6d
VulStyle
: A Multi-Modal Pre-Training for Code
Stylometry-Augmented
Vulnerability Detection
💾
Binary Analysis
arxiv.org
·
20h
SeqShield
: A Behavioral Analysis Approach to Uncover
Rootkits
💾
Binary Analysis
arxiv.org
·
2d
Introducing the Cyber-Physical Data Flow
Diagram
to Improve Threat
Modelling
of Internet of Things Devices
🔌
Hardware Security
arxiv.org
·
3d
MAS-SZZ
: Multi-Agentic
SZZ
Algorithm for
Vulnerability-Inducing
Commit Identification
🛡️
Exploit Mitigations
arxiv.org
·
2d
Don\'t Stop Early: Scalable Enterprise Deep Research with
Controlled
Information Flow and Evidence-Aware
Termination
🌊
Dataflow Analysis
arxiv.org
·
1d
Residual
Risk Analysis in
Benign
Code: How Far Are We? A Multi-Model Semantic and Structural Similarity Approach
🔄
Reverse Engineering
arxiv.org
·
6d
GoAT-X
: A Graph of
Auditing
Thoughts for Securing Token Transactions in Cross-Chain Contracts
⛓️
ROP Chains
arxiv.org
·
2d
Less Is More: Measuring How LLM
Involvement
affects
Chatbot Accuracy in Static Analysis
⚡
JIT Exploitation
arxiv.org
·
6d
Verifying
Provenance of Digital Media: Why the
C2PA
Specifications Fall Short
✅
Formal Verification
arxiv.org
·
1d
A
systematic
literature
Review for Transformer-based Software Vulnerability detection
⚡
JIT Exploitation
arxiv.org
·
1d
Strategic
Heterogeneous
Multi-Agent Architecture for Cost-Effective Code
Vulnerability
Detection
🎲
Fuzzing
arxiv.org
·
6d
Constraint-Guided Multi-Agent
Decompilation
for
Executable
Binary Recovery
📜
Decompilation
arxiv.org
·
2d
Mono2Sls
: Automated
Monolith-to-Serverless
Migration via Multi-Stage Pipeline with Static Analysis
🔣
Type Systems
arxiv.org
·
2d
A Ground-Truth-Based Evaluation of
Vulnerability
Detection Across Multiple
Ecosystems
🛡️
Vulnerability Research
arxiv.org
·
6d
From
Syntax
to Emotion: A
Mechanistic
Analysis of Emotion Inference in LLMs
🔣
Type Systems
arxiv.org
·
1d
CrossCommitVuln-Bench
: A Dataset of
Multi-Commit
Python Vulnerabilities Invisible to
Per-Commit
Static Analysis
⚡
JIT Exploitation
arxiv.org
·
6d
Incisor
: Ex Ante Cloud Instance Selection for
HPC
Jobs
🛡️
Exploit Mitigations
arxiv.org
·
2d
PLMGH
: What Matters in
PLM-GNN
Hybrids for Code Classification and Vulnerability Detection
💾
Binary Analysis
arxiv.org
·
1d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help