Linked Presentation: PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code AnalysisYour Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract