Unmasking Virtualized Malware: A New Approach to Binary Deobfuscation

Researchers have developed a scalable technique to analyze and reverse virtualization-based obfuscation, a common malware defense evasion tactic.

Researchers have developed a scalable technique to analyze and reverse virtualization-based obfuscation, a common malware defense evasion tactic.

New research delves into the intricate world of heavy flavor physics, exploring the decay patterns and internal structure of particles containing charm and bottom quarks.

New research explores whether large language models can perform the logical reasoning needed for formal program verification, and reveals significant limitations in their ability to handle complex proofs.
A new analysis categorizes the complexity of card-based shuffle operations, providing a crucial benchmark for evaluating cryptographic protocol security.

New research provides a detailed physical model to quantify how susceptible DRAM memory cells are to attacks like Rowhammer and Rowpress.

New research demonstrates algorithms that leverage quantum Monte Carlo to improve the reliability of quantum bandit algorithms on today’s noisy quantum hardware.
![The study demonstrates that security optimization within a Finite-State Automaton (FAS) exhibits a nuanced relationship with evolving threat landscapes, revealing a three-dimensional surface of secrecy and throughput that shifts based on eavesdropper capabilities-specifically, with analyses conducted across scenarios featuring five, fifteen, and twenty-five network eavesdroppers [latex]N\_E = 5, 15, 25[/latex].](https://arxiv.org/html/2603.17224v1/x7.png)
New research demonstrates how dynamically adjusting antenna configurations can dramatically improve the security of short wireless transmissions against eavesdropping.

Researchers are leveraging the inner workings of audio compression to build more robust detectors for synthetic speech and audio deepfakes.

Researchers have developed Keyfort, a comprehensive solution to address critical security gaps in the software development lifecycle for RISC-V Trusted Execution Environments.

A new paradigm aims to sidestep traditional memory bottlenecks by directly recalling states using their inherent physical properties.