Binary similarity analysis determines if two binary executables are from...
Decompilation aims to recover the source code form of a binary executabl...
Reverse engineering of protocol message formats is critical for many sec...
Self-supervised learning in computer vision trains on unlabeled data, su...
Deep Learning backdoor attacks have a threat model similar to traditiona...