May 16, 2022, 1:20 a.m. | Steffen Enders, Eva-Maria C. Behner, Niklas Bergmann, Mariia Rybalka, Elmar Padilla, Er Xue Hui, Henry Low, Nicholas Sim

cs.CR updates on arXiv.org arxiv.org

Analyzing third-party software such as malware or firmware is a crucial task
for security analysts. Although various approaches for automatic analysis exist
and are the subject of ongoing research, analysts often have to resort to
manual static analysis to get a deep understanding of a given binary sample.
Since the source code of encountered samples is rarely available, analysts
regularly employ decompilers for easier and faster comprehension than analyzing
a binary's disassembly.


In this paper, we introduce our decompilation approach …

surveys

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Team Lead, Security Operations Center, Cyber Risk

@ Kroll | United Kingdom

Cyber Security Risk Analyst

@ College Board | Remote - Virginia

Lead - IT Security Engineer

@ Bosch Group | BENGALURU, India

Project Cybersecurity Manager

@ Alstom | Bengaluru, KA, IN

Security Consultant

@ CloudSEK | Bengaluru, Karnataka, India