| Semantic Preprocessing for LLM-based Malware Analysis | Jun 13, 2025 | Language ModelingLanguage Modelling | —Unverified | 0 |
| EMBER2024 -- A Benchmark Dataset for Holistic Evaluation of Malware Classifiers | Jun 5, 2025 | Malware AnalysisMalware Classification | CodeCode Available | 2 |
| System Calls for Malware Detection and Classification: Methodologies and Applications | Jun 2, 2025 | Anomaly DetectionMalware Analysis | —Unverified | 0 |
| Adapting Novelty towards Generating Antigens for Antivirus systems | May 24, 2025 | Evolutionary AlgorithmsMalware Analysis | —Unverified | 0 |
| DecompileBench: A Comprehensive Benchmark for Evaluating Decompilers in Real-World Scenarios | May 16, 2025 | Malware Analysis | CodeCode Available | 1 |
| Dual Explanations via Subgraph Matching for Malware Detection | Apr 29, 2025 | Malware AnalysisMalware Detection | —Unverified | 0 |
| Malware analysis assisted by AI with R2AI | Apr 10, 2025 | Malware Analysis | —Unverified | 0 |
| Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering | Apr 7, 2025 | Language ModelingLanguage Modelling | —Unverified | 0 |
| Identifying Obfuscated Code through Graph-Based Semantic Analysis of Binary Code | Apr 2, 2025 | Malware AnalysisObfuscation Detection | —Unverified | 0 |
| On Benchmarking Code LLMs for Android Malware Analysis | Apr 1, 2025 | BenchmarkingMalware Analysis | —Unverified | 0 |
| CyberLLMInstruct: A New Dataset for Analysing Safety of Fine-Tuned LLMs Using Cyber Security Data | Mar 12, 2025 | Adversarial AttackMalware Analysis | CodeCode Available | 1 |
| LAMD: Context-driven Android Malware Detection and Classification with LLMs | Feb 18, 2025 | Android Malware DetectionMalware Analysis | —Unverified | 0 |
| Recent Advances in Malware Detection: Graph Learning and Explainability | Feb 14, 2025 | Feature EngineeringGraph Embedding | —Unverified | 0 |
| Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware | Jan 8, 2025 | Malware AnalysisPrompt Engineering | —Unverified | 0 |
| On the Lack of Robustness of Binary Function Similarity Systems | Dec 5, 2024 | Malware AnalysisVulnerability Detection | —Unverified | 0 |
| Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM | Nov 8, 2024 | Language ModelingLanguage Modelling | —Unverified | 0 |
| Is Function Similarity Over-Engineered? Building a Benchmark | Oct 30, 2024 | Malware AnalysisVulnerability Detection | CodeCode Available | 1 |
| Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges | Oct 14, 2024 | Deep LearningMalware Analysis | —Unverified | 0 |
| Domain-Specific Retrieval-Augmented Generation Using Vector Stores, Knowledge Graphs, and Tensor Factorization | Oct 3, 2024 | Anomaly DetectionAttribute | —Unverified | 0 |
| Magika: AI-Powered Content-Type Detection | Sep 18, 2024 | CPUMalware Analysis | CodeCode Available | 11 |
| Revisiting Static Feature-Based Android Malware Detection | Sep 11, 2024 | Android Malware DetectionComputer Security | —Unverified | 0 |
| Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges | Sep 9, 2024 | Explainable artificial intelligenceExplainable Artificial Intelligence (XAI) | —Unverified | 0 |
| A Lean Transformer Model for Dynamic Malware Analysis and Detection | Aug 5, 2024 | Malware Analysis | —Unverified | 0 |
| On the Robustness of Malware Detectors to Adversarial Samples | Aug 5, 2024 | image-classificationImage Classification | —Unverified | 0 |
| Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response | Aug 4, 2024 | Decision MakingMalware Analysis | —Unverified | 0 |