Abstract: Existing code obfuscation techniques introduce bogus control flow and string obfuscation to conceal program logic and hardcoded sensitive information but exhibit insufficient code semantic ...
Abstract: Neural code models (NCMs) have demonstrated extraordinary capabilities in code intelligence tasks. Meanwhile, the security of NCMs and NCMs-based systems has garnered increasing attention.