Skip to content

Latest commit

 

History

History
9 lines (7 loc) · 1.12 KB

README.md

File metadata and controls

9 lines (7 loc) · 1.12 KB

CCS2024

Number of papers: 1

  • Authors: Xie, Danning and Zhang, Zhuo and Jiang, Nan and Xu, Xiangzhe and Tan, Lin and Zhang, Xiangyu
  • Abstract: Decompilation aims to recover a binary executable to the source code form and hence has a wide range of applications in cyber security, such as malware analysis and legacy code hardening. A prominent challenge is to recover variable symbols, including both primitive and complex types such as user-defined data structures, along with their symbol information such as names and types. Existing efforts focus on solving parts of the problem, eg, recovering only types (without names) or only local vari...
  • Link: Read Paper
  • Labels: code model, code model training, binary code model, static analysis, program decompilation