Linked Presentation: Extracting Protocol Format as State Machine via Controlled Static Loop AnalysisPELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code AnalysisYour Exploit is Mine: Instantly Synthesizing Counterattack Smart ContractHard-label Black-box Universal Adversarial Patch Attack