Tootfinder

Opt-in global Mastodon full text search. Join the index!

@arXiv_csSE_bot@mastoxiv.page
2025-10-14 10:12:48

Grounded AI for Code Review: Resource-Efficient Large-Model Serving in Enterprise Pipelines
Sayan Mandal, Hua Jiang
arxiv.org/abs/2510.10290

@arXiv_csLO_bot@mastoxiv.page
2025-10-13 07:48:40

U-Turn: Enhancing Incorrectness Analysis by Reversing Direction
Flavio Ascari, Roberto Bruni, Roberta Gori, Azalea Raad
arxiv.org/abs/2510.09292

@joxean@mastodon.social
2025-11-10 09:50:59

Rapid insights for malware analysts, by Marc Rivero (@…).
Talk about r2inspect "a framework for static malware analysis built on top of radare2 and r2pipe, providing accurate detection of obfuscated strings, cryptographic signatures, exploit mitigation analysis, and more".

@arXiv_csCR_bot@mastoxiv.page
2025-10-08 10:12:29

"Your Doctor is Spying on You": An Analysis of Data Practices in Mobile Healthcare Applications
Luke Stevenson, Sanchari Das
arxiv.org/abs/2510.06015

@arXiv_csCL_bot@mastoxiv.page
2025-10-06 10:15:09

Time-To-Inconsistency: A Survival Analysis of Large Language Model Robustness to Adversarial Attacks
Yubo Li, Ramayya Krishnan, Rema Padman
arxiv.org/abs/2510.02712

@arXiv_csSE_bot@mastoxiv.page
2025-10-06 08:32:59

ZeroFalse: Improving Precision in Static Analysis with LLMs
Mohsen Iranmanesh (Simon Fraser University), Sina Moradi Sabet (Amirkabir University of Technology), Sina Marefat (K. N. Toosi University of Technology), Ali Javidi Ghasr (Ferdowsi University of Mashhad), Allison Wilson (Cyber Risk Solutions), Iman Sharafaldin (Forward Security), Mohammad A. Tayebi (Simon Fraser University)

@arXiv_csAI_bot@mastoxiv.page
2025-10-03 10:41:11

Exploring Network-Knowledge Graph Duality: A Case Study in Agentic Supply Chain Risk Analysis
Evan Heus, Rick Bookstaber, Dhruv Sharma
arxiv.org/abs/2510.01115

@arXiv_csPL_bot@mastoxiv.page
2025-09-17 09:43:20

Try-Mopsa: Relational Static Analysis in Your Pocket
Rapha\"el Monat
arxiv.org/abs/2509.13128 arxiv.org/pdf/2509.13128

@nemobis@mamot.fr
2025-10-28 14:10:50

"This paper presents a comprehensive scientometric analysis of the long-term impact of [event] on the nation scientific development."
*oh, interesting!*
"Using Scopus-indexed data..."
*closes tab*

@arXiv_csDC_bot@mastoxiv.page
2025-10-06 07:47:19

TridentServe: A Stage-level Serving System for Diffusion Pipelines
Yifei Xia, Fangcheng Fu, Hao Yuan, Hanke Zhang, Xupeng Miao, Yijun Liu, Suhan Ling, Jie Jiang, Bin Cui
arxiv.org/abs/2510.02838

@arXiv_csAI_bot@mastoxiv.page
2025-10-02 10:43:51

Exploring Network-Knowledge Graph Duality: A Case Study in Agentic Supply Chain Risk Analysis
Evan Heus, Rick Bookstaber, Dhruv Sharma
arxiv.org/abs/2510.01115

@arXiv_csSE_bot@mastoxiv.page
2025-09-29 10:12:27

Boosting Pointer Analysis With Large Language Model-Enhanced Allocation Function Detection
Baijun Cheng, Kailong Wang, Ling Shi, Haoyu Wang, Peng Di, Yao Guo, Ding Li, Xiangqun Chen
arxiv.org/abs/2509.22530

@arXiv_csCR_bot@mastoxiv.page
2025-09-22 07:34:01

Synergizing Static Analysis with Large Language Models for Vulnerability Discovery and beyond
Vaibhav Agrawal, Kiarash Ahi
arxiv.org/abs/2509.15433

@arXiv_grqc_bot@mastoxiv.page
2025-09-22 08:01:11

Static AdS Black Holes Surrounded by Strings and Quintessence-like Field within Rastall Gravity Framework
Allan. R. P. Moreira, Faizuddin Ahmed, Abdelmalek Bouzenada
arxiv.org/abs/2509.15274

@arXiv_csNI_bot@mastoxiv.page
2025-09-23 08:48:00

Analysis of an Architecture for Integrated Sensing and Communication in 5G OpenRAN
Daniel Lindenschmitt, Tobias Jung, Prudhvi Kumar Kakani, Torsten Reissland, Norman Franchi, Hans D. Schotten
arxiv.org/abs/2509.16917

@arXiv_condmatdisnn_bot@mastoxiv.page
2025-09-29 08:50:08

Transfer tensor analysis of localization in the Anderson and Aubry-Andr\'e-Harper models
Michelle C. Anderson, Chern Chuang
arxiv.org/abs/2509.21374

@arXiv_csSE_bot@mastoxiv.page
2025-09-16 10:53:56

CodeCureAgent: Automatic Classification and Repair of Static Analysis Warnings
Pascal Joos, Islem Bouzenia, Michael Pradel
arxiv.org/abs/2509.11787

@arXiv_econGN_bot@mastoxiv.page
2025-09-30 09:12:11

Pixels to Prices: Visual Traits, Market Cycles, and the Economics of NFT Valuation
Samiha Tariq
arxiv.org/abs/2509.24879 arxiv.org/pdf/2509…

@arXiv_csCL_bot@mastoxiv.page
2025-09-17 10:37:00

LLM Hallucination Detection: A Fast Fourier Transform Method Based on Hidden Layer Temporal Signals
Jinxin Li, Gang Tu, ShengYu Cheng, Junjie Hu, Jinting Wang, Rui Chen, Zhilong Zhou, Dongbo Shan
arxiv.org/abs/2509.13154

@arXiv_mathNA_bot@mastoxiv.page
2025-09-19 10:05:11

On the Late-Time Instability of MOT solution to the Time-Domain PMCHWT Equation
Van Chien Le, Viviana Giunzioni, Pierrick Cordel, Francesco P. Andriulli, Kristof Cools
arxiv.org/abs/2509.14995

@arXiv_csCR_bot@mastoxiv.page
2025-09-19 09:36:41

ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System
Taesoo Kim, HyungSeok Han, Soyeon Park, Dae R. Jeong, Dohyeok Kim, Dongkwan Kim, Eunsoo Kim, Jiho Kim, Joshua Wang, Kangsu Kim, Sangwoo Ji, Woosun Song, Hanqing Zhao, Andrew Chin, Gyejin Lee, Kevin Stevens, Mansour Alharthi, Yizhuo Zhai, Cen Zhang, Joonun Jang, Yeongjin Jang, Ammar Askar, Dongju Kim, Fabian Fleischer, Jeongin Cho, Junsik Kim, Kyungjoon Ko, Insu Yun, Sangdon Park, Dowoo Baik, Haein Lee, Hy…

@arXiv_csSE_bot@mastoxiv.page
2025-10-08 09:53:29

Explaining Code Risk in OSS: Towards LLM-Generated Fault Prediction Interpretations
Elijah Kayode Adejumo, Brittany Johnson
arxiv.org/abs/2510.06104

@arXiv_csSE_bot@mastoxiv.page
2025-09-16 11:04:36

LitterBox : An Extensible Framework for LLM-enhanced Scratch Static Code Analysis
Benedikt Fein, Florian Oberm\"uller, Gordon Fraser
arxiv.org/abs/2509.12021

@arXiv_csCR_bot@mastoxiv.page
2025-09-30 12:14:01

BugMagnifier: TON Transaction Simulator for Revealing Smart Contract Vulnerabilities
Yury Yanovich, Victoria Kovalevskaya, Maksim Egorov, Elizaveta Smirnova, Matvey Mishuris, Yash Madhwal, Kirill Ziborov, Vladimir Gorgadze, Subodh Sharma
arxiv.org/abs/2509.24444

@arXiv_csCR_bot@mastoxiv.page
2025-09-24 09:36:24

Security Evaluation of Android apps in budget African Mobile Devices
Alioune Diallo, Anta Diop, Abdoul Kader Kabore, Jordan Samhi, Aleksandr Pilgun, Tegawend\'e F. Bissyande, Jacque Klein
arxiv.org/abs/2509.18800

@arXiv_csSE_bot@mastoxiv.page
2025-09-23 09:28:40

Can We Trust the AI Pair Programmer? Copilot for API Misuse Detection and Correction
Saikat Mondal, Chanchal K. Roy, Hong Wang, Juan Arguello, Samantha Mathan
arxiv.org/abs/2509.16795

@arXiv_csCR_bot@mastoxiv.page
2025-09-18 09:42:51

The Cybersecurity of a Humanoid Robot
V\'ictor Mayoral-Vilches
arxiv.org/abs/2509.14096 arxiv.org/pdf/2509.14096

@arXiv_csCR_bot@mastoxiv.page
2025-09-17 10:05:30

Characterizing Phishing Pages by JavaScript Capabilities
Aleksandr Nahapetyan, Kanv Khare, Kevin Schwarz, Bradley Reaves, Alexandros Kapravelos
arxiv.org/abs/2509.13186

@arXiv_csSE_bot@mastoxiv.page
2025-09-17 09:43:50

Validating Solidity Code Defects using Symbolic and Concrete Execution powered by Large Language Models
\c{S}tefan-Claudiu Susan ("Alexandru Ioan Cuza", University of Ia\c{s}i, Department of Computer Science), Andrei Arusoaie ("Alexandru Ioan Cuza", University of Ia\c{s}i, Department of Computer Science), Dorel Lucanu ("Alexandru Ioan Cuza", University of Ia\c{s}i, Department of Computer Science)