{"id":"https://openalex.org/W7152008171","doi":"https://doi.org/10.48550/arxiv.2604.06095","title":"LLM4CodeRE: Generative AI for Code Decompilation Analysis and Reverse Engineering","display_name":"LLM4CodeRE: Generative AI for Code Decompilation Analysis and Reverse Engineering","publication_year":2026,"publication_date":"2026-04-07","ids":{"openalex":"https://openalex.org/W7152008171","doi":"https://doi.org/10.48550/arxiv.2604.06095"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.06095","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.06095","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.06095","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050550263","display_name":"Hamed Jelodar","orcid":"https://orcid.org/0000-0002-0713-3143"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jelodar, Hamed","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059117509","display_name":"Samita Bai","orcid":"https://orcid.org/0000-0003-0024-3689"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bai, Samita","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133232363","display_name":"Tochukwu Emmanuel Nwankwo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nwankwo, Tochukwu Emmanuel","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133215200","display_name":"Parisa Hamedi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hamedi, Parisa","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119912707","display_name":"Mohammad Meymani","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Meymani, Mohammad","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133183842","display_name":"Roozbeh Razavi-Far","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Razavi-Far, Roozbeh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5133155118","display_name":"Ali A. Ghorbani","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ghorbani, Ali A.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5050550263"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9585000276565552,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9585000276565552,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.018799999728798866,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.009700000286102295,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.9039999842643738},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6762999892234802},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.5116999745368958},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5084999799728394},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.48159998655319214},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.4203999936580658},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4016000032424927},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.3937000036239624}],"concepts":[{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.9039999842643738},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.828000009059906},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6762999892234802},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5703999996185303},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.5116999745368958},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5084999799728394},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.48159998655319214},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.4203999936580658},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4016000032424927},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.3937000036239624},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.387800008058548},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38429999351501465},{"id":"https://openalex.org/C509989072","wikidata":"https://www.wikidata.org/wiki/Q15188241","display_name":"Model-driven architecture","level":4,"score":0.33820000290870667},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.337799996137619},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3116999864578247},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.3091000020503998},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.2863999903202057},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.2815999984741211},{"id":"https://openalex.org/C94922259","wikidata":"https://www.wikidata.org/wiki/Q33215","display_name":"Constructed language","level":2,"score":0.26660001277923584},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C149364088","wikidata":"https://www.wikidata.org/wiki/Q185917","display_name":"Translation (biology)","level":4,"score":0.26170000433921814},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.2565999925136566},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.25290000438690186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.06095","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.06095","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.06095","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.06095","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Code":[0],"decompilation":[1,70,120],"analysis":[2],"is":[3],"a":[4,57,75,90,101],"fundamental":[5],"yet":[6],"challenging":[7],"task":[8,81],"in":[9,32],"malware":[10],"reverse":[11,64],"engineering,":[12],"particularly":[13],"due":[14],"to":[15,51,108],"the":[16],"pervasive":[17],"use":[18],"of":[19],"sophisticated":[20],"obfuscation":[21],"techniques.":[22],"Although":[23],"recent":[24],"large":[25],"language":[26],"models":[27],"(LLMs)":[28],"have":[29],"shown":[30],"promise":[31],"translating":[33],"low-level":[34],"representations":[35],"into":[36],"high-level":[37],"source":[38],"code,":[39],"most":[40],"existing":[41,119],"approaches":[42],"rely":[43],"on":[44],"generic":[45],"code":[46,63,124],"pretraining":[47],"and":[48,71,96,99,122],"lack":[49],"adaptation":[50],"malicious":[52],"software.":[53],"We":[54],"propose":[55],"LLM4CodeRE,":[56],"domain-adaptive":[58],"LLM":[59],"framework":[60],"for":[61,93],"bidirectional":[62,128],"engineering":[65],"that":[66,116],"supports":[67],"both":[68],"assembly-to-source":[69],"source-to-assembly":[72],"translation":[73],"within":[74],"unified":[76],"model.":[77],"To":[78],"enable":[79],"effective":[80],"adaptation,":[82],"we":[83],"introduce":[84],"two":[85],"complementary":[86],"fine-tuning":[87],"strategies:":[88],"(i)":[89],"Multi-Adapter":[91],"approach":[92,104],"task-specific":[94],"syntactic":[95],"semantic":[97],"alignment,":[98],"(ii)":[100],"Seq2Seq":[102],"Unified":[103],"using":[105],"task-conditioned":[106],"prefixes":[107],"enforce":[109],"end-to-end":[110],"generation":[111],"constraints.":[112],"Experimental":[113],"results":[114],"demonstrate":[115],"LLM4CodeRE":[117],"outperforms":[118],"tools":[121],"general-purpose":[123],"models,":[125],"achieving":[126],"robust":[127],"generalization.":[129]},"counts_by_year":[],"updated_date":"2026-04-09T06:13:59.934233","created_date":"2026-04-09T00:00:00"}
