ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2010.00770
  4. Cited By
XDA: Accurate, Robust Disassembly with Transfer Learning
v1v2v3 (latest)

XDA: Accurate, Robust Disassembly with Transfer Learning

Network and Distributed System Security Symposium (NDSS), 2020
2 October 2020
Kexin Pei
Jonas Guan
David Williams-King
Junfeng Yang
Suman Jana
ArXiv (abs)PDFHTMLGithub (85★)

Papers citing "XDA: Accurate, Robust Disassembly with Transfer Learning"

26 / 26 papers shown
Adversarially Robust Assembly Language Model for Packed Executables Detection
Adversarially Robust Assembly Language Model for Packed Executables Detection
Shijia Li
Jiang Ming
Lanqing Liu
Longwei Yang
Ni Zhang
Chunfu Jia
104
0
0
19 Sep 2025
CodableLLM: Automating Decompiled and Source Code Mapping for LLM Dataset Generation
CodableLLM: Automating Decompiled and Source Code Mapping for LLM Dataset Generation
Dylan Manuel
Paul Rad
SyDa
131
0
0
02 Jul 2025
Tady: A Neural Disassembler without Structural Constraint Violations
Tady: A Neural Disassembler without Structural Constraint Violations
Siliang Qin
Fengrui Yang
Hao Wang
Bolun Zhang
Zeyu Gao
Chao Zhang
Kai Chen
99
0
0
16 Jun 2025
Disassembly as Weighted Interval Scheduling with Learned Weights
Disassembly as Weighted Interval Scheduling with Learned WeightsIEEE Symposium on Security and Privacy (S&P), 2025
Antonio Flores-Montoya
Junghee Lim
Adam Seitz
Akshay Sood
Edward Raff
James Holt
141
1
0
02 May 2025
Padding Matters -- Exploring Function Detection in PE Files
Padding Matters -- Exploring Function Detection in PE FilesConference on Data and Application Security and Privacy (CODASPY), 2024
Raphael Springer
Alexander Schmitz
Artur Leinweber
Tobias Urban
Christian Dietrich
123
0
0
30 Apr 2025
Frontier AI's Impact on the Cybersecurity Landscape
Frontier AI's Impact on the Cybersecurity Landscape
Wenbo Guo
Wenbo Guo
Tianneng Shi
Yu Yang
Andy Zhang
Patrick Gage Kelley
Kurt Thomas
Kurt Thomas
Dawn Song
527
12
0
07 Apr 2025
On the Role of Pre-trained Embeddings in Binary Code Analysis
On the Role of Pre-trained Embeddings in Binary Code AnalysisACM Asia Conference on Computer and Communications Security (AsiaCCS), 2024
Alwin Maier
Felix Weissberg
Konrad Rieck
256
1
0
12 Feb 2025
A Progressive Transformer for Unifying Binary Code Embedding and
  Knowledge Transfer
A Progressive Transformer for Unifying Binary Code Embedding and Knowledge TransferIEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2024
Hanxiao Lu
Hongyu Cai
Yiming Liang
Antonio Bianchi
Z. Berkay Celik
290
1
0
15 Dec 2024
VulCatch: Enhancing Binary Vulnerability Detection through CodeT5
  Decompilation and KAN Advanced Feature Extraction
VulCatch: Enhancing Binary Vulnerability Detection through CodeT5 Decompilation and KAN Advanced Feature Extraction
Abdulrahman Hamman Adama Chukkol
Senlin Luo
Kashif Sharif
Yunusa Haruna
Muhammad Muhammad Abdullahi
148
3
0
13 Aug 2024
Disassembling Obfuscated Executables with LLM
Disassembling Obfuscated Executables with LLM
Tianhao Mao
Yue Duan
Hang Zhang
XiaoFeng Wang
Hongbo Chen
Shengchen Duan
Shen Wang
285
10
0
12 Jul 2024
Source Code Foundation Models are Transferable Binary Analysis Knowledge
  Bases
Source Code Foundation Models are Transferable Binary Analysis Knowledge Bases
Zian Su
Xiangzhe Xu
Ziyang Huang
Kaiyuan Zhang
Xiangyu Zhang
193
10
0
30 May 2024
TrojFM: Resource-efficient Backdoor Attacks against Very Large
  Foundation Models
TrojFM: Resource-efficient Backdoor Attacks against Very Large Foundation Models
Yuzhou Nie
Yanting Wang
Jinyuan Jia
Michael J. De Lucia
Nathaniel D. Bastian
Wenbo Guo
Dawn Song
SILMAAML
246
8
0
27 May 2024
Assemblage: Automatic Binary Dataset Construction for Machine Learning
Assemblage: Automatic Binary Dataset Construction for Machine Learning
Chang Liu
Rebecca Saul
Yihao Sun
Edward Raff
Maya Fuchs
Townsend Southard Pantano
James Holt
Kristopher K. Micinski
170
13
0
07 May 2024
Transfer Learning for Security: Challenges and Future Directions
Transfer Learning for Security: Challenges and Future Directions
Adrian Shuai Li
Arun Iyengar
Ashish Kundu
Elisa Bertino
AAML
239
6
0
01 Mar 2024
CLAP: Learning Transferable Binary Code Representations with Natural
  Language Supervision
CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision
Hao Wang
Zeyu Gao
Chao Zhang
Zihan Sha
Mingyang Sun
Yuchen Zhou
Wenyu Zhu
Wenju Sun
Han Qiu
Xiangwei Xiao
162
38
0
26 Feb 2024
Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large
  Language Models
Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models
Xin Jin
Jonathan Larson
Weiwei Yang
Zhiqiang Lin
ELM
159
33
0
15 Dec 2023
BinGo: Identifying Security Patches in Binary Code with Graph
  Representation Learning
BinGo: Identifying Security Patches in Binary Code with Graph Representation LearningACM Asia Conference on Computer and Communications Security (AsiaCCS), 2023
Xu He
Shu Wang
Pengbin Feng
Xinda Wang
Shiyu Sun
Qi Li
Kun Sun
145
2
0
13 Dec 2023
kTrans: Knowledge-Aware Transformer for Binary Code Embedding
kTrans: Knowledge-Aware Transformer for Binary Code Embedding
Wenyu Zhu
Hao Wang
Yuchen Zhou
Jiaming Wang
Zihan Sha
Zeyu Gao
Chao Zhang
250
13
0
24 Aug 2023
Boosting Neural Networks to Decompile Optimized Binaries
Boosting Neural Networks to Decompile Optimized BinariesAsia-Pacific Computer Systems Architecture Conference (ACSA), 2022
Ying Cao
Ruigang Liang
Kai Chen
Peiwei Hu
153
32
0
03 Jan 2023
Beyond the C: Retargetable Decompilation using Neural Machine
  Translation
Beyond the C: Retargetable Decompilation using Neural Machine Translation
Iman Hosseini
Brendan Dolan-Gavitt
220
27
0
17 Dec 2022
Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing
  and Multi-Task Learning
Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task LearningInternational Conference on Software Quality, Reliability and Security (QRS), 2022
Yi Qian
Ligeng Chen
Yuyang Wang
Bing Mao
155
0
0
08 Nov 2022
NeuDep: Neural Binary Memory Dependence Analysis
NeuDep: Neural Binary Memory Dependence Analysis
Kexin Pei
Dongdong She
Michael Wang
Scott Geng
Zhou Xuan
Yaniv David
Junfeng Yang
Suman Jana
Baishakhi Ray
221
7
0
04 Oct 2022
Black-box Attacks Against Neural Binary Function Detection
Black-box Attacks Against Neural Binary Function DetectionInternational Symposium on Recent Advances in Intrusion Detection (RAID), 2022
Josh Bundt
Michael Davinroy
Ioannis Agadakos
Alina Oprea
William K. Robertson
AAML
190
2
0
24 Aug 2022
Pop Quiz! Can a Large Language Model Help With Reverse Engineering?
Pop Quiz! Can a Large Language Model Help With Reverse Engineering?
Hammond Pearce
Benjamin Tan
Prashanth Krishnamurthy
Farshad Khorrami
Ramesh Karri
Brendan Dolan-Gavitt
ELM
144
33
0
02 Feb 2022
Callee: Recovering Call Graphs for Binaries with Transfer and
  Contrastive Learning
Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive LearningIEEE Symposium on Security and Privacy (IEEE S&P), 2021
Wenyu Zhu
Zhiyao Feng
Zihan Zhang
Jian-jun Chen
Zhijian Ou
Min Yang
Chao Zhang
AAML
226
10
0
02 Nov 2021
Trex: Learning Execution Semantics from Micro-Traces for Binary
  Similarity
Trex: Learning Execution Semantics from Micro-Traces for Binary Similarity
Kexin Pei
Zhou Xuan
Junfeng Yang
Suman Jana
Baishakhi Ray
430
111
0
16 Dec 2020
1