{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:02:12Z","timestamp":1773154932355,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":73,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819529605","type":"print"},{"value":"9789819529612","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2961-2_22","type":"book-chapter","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:01:14Z","timestamp":1760364074000},"page":"426-445","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["GenDetect: Generative Large Language Model Usage in\u00a0Smart Contract Vulnerability Detection"],"prefix":"10.1007","author":[{"given":"Peter","family":"Ince","sequence":"first","affiliation":[]},{"given":"Jiangshan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaoning","family":"Du","sequence":"additional","affiliation":[]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"key":"22_CR1","unstructured":"DeFi Hacks Analysis - Root Cause. https:\/\/wooded-meter-1d8.notion.site\/0e85e02c5ed34df3855ea9f3ca40f53b?v=22e5e2c506ef4caeb40b4f78e23517ee"},{"key":"22_CR2","unstructured":"OWASP Smart Contract Top 10 (2023). https:\/\/owasp.org\/www-project-smart-contract-top-10\/"},{"key":"22_CR3","unstructured":"Code4rena findings on Github (2024). https:\/\/github.com\/code-423n4"},{"key":"22_CR4","unstructured":"MetaTrustLabs\/GPTScan-Top200 (2024). https:\/\/github.com\/MetaTrustLabs\/GPTScan-Top200"},{"key":"22_CR5","doi-asserted-by":"publisher","unstructured":"Boi, B., Esposito, C., Lee, S.: VulnHunt-GPT: a smart contract vulnerabilities detector based on OpenAI chatGPT. In: Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing, pp. 1517\u20131524. SAC \u201924, Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3605098.3636003","DOI":"10.1145\/3605098.3636003"},{"key":"22_CR6","doi-asserted-by":"publisher","unstructured":"Brown, T.B., et\u00a0al.: Language models are few-shot learners (2020). https:\/\/doi.org\/10.48550\/arXiv.2005.14165, arXiv:2005.14165","DOI":"10.48550\/arXiv.2005.14165"},{"key":"22_CR7","unstructured":"Buterin, V.: Ethereum: a next-generation smart contract and decentralized application platform, p.\u00a036 (2014)"},{"key":"22_CR8","unstructured":"Certora: Certora Audit Reports. https:\/\/www.certora.com\/reports"},{"key":"22_CR9","unstructured":"Consensys: Mythril: Security analysis tool for EVM bytecode (2023). https:\/\/github.com\/Consensys\/mythril"},{"key":"22_CR10","doi-asserted-by":"publisher","unstructured":"Dao, T.: FlashAttention-2: faster attention with better parallelism and work partitioning (2023). https:\/\/doi.org\/10.48550\/arXiv.2307.08691, arXiv:2307.08691","DOI":"10.48550\/arXiv.2307.08691"},{"key":"22_CR11","doi-asserted-by":"publisher","unstructured":"David, I., et\u00a0al.: Do you still need a manual smart contract audit? (2023). https:\/\/doi.org\/10.48550\/arXiv.2306.12338, arXiv:2306.12338","DOI":"10.48550\/arXiv.2306.12338"},{"key":"22_CR12","doi-asserted-by":"publisher","unstructured":"Dettmers, T., et\u00a0al.: QLoRA: efficient finetuning of quantized LLMs (2023). https:\/\/doi.org\/10.48550\/arXiv.2305.14314, arXiv:2305.14314","DOI":"10.48550\/arXiv.2305.14314"},{"key":"22_CR13","doi-asserted-by":"publisher","unstructured":"Devlin, J., et\u00a0al.: BERT: pre-training of deep bidirectional transformers for language understanding (2019). https:\/\/doi.org\/10.48550\/arXiv.1810.04805, arXiv:1810.04805","DOI":"10.48550\/arXiv.1810.04805"},{"key":"22_CR14","doi-asserted-by":"publisher","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 8\u201315 (2019). https:\/\/doi.org\/10.1109\/WETSEB.2019.00008, arXiv:1908.09878","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"22_CR15","doi-asserted-by":"publisher","unstructured":"Feng, Z., et\u00a0al.: CodeBERT: a pre-trained model for programming and natural languages (2020). https:\/\/doi.org\/10.48550\/arXiv.2002.08155, arXiv:2002.08155","DOI":"10.48550\/arXiv.2002.08155"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Ferreira, J.F., et\u00a0al.: SmartBugs: a framework to analyze solidity smart contracts. In: 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1349\u20131352 (2020). https:\/\/ieeexplore.ieee.org\/document\/9285656, iSSN: 2643-1572","DOI":"10.1145\/3324884.3415298"},{"key":"22_CR17","doi-asserted-by":"publisher","unstructured":"Gai, Y., et\u00a0al.: Blockchain large language models (2023). https:\/\/doi.org\/10.48550\/arXiv.2304.12749, arXiv:2304.12749","DOI":"10.48550\/arXiv.2304.12749"},{"key":"22_CR18","doi-asserted-by":"publisher","unstructured":"Grieco, G., et\u00a0al.: Echidna: effective, usable, and fast fuzzing for smart contracts. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 557\u2013560. ISSTA 2020, Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3395363.3404366","DOI":"10.1145\/3395363.3404366"},{"key":"22_CR19","unstructured":"Hadi, M.U., et\u00a0al.: A survey on large language models: applications, challenges, limitations, and practical usage (2023). https:\/\/www.authorea.com\/doi\/full\/10.36227\/techrxiv.23589741.v1?commit=b1cb46f5b0f749cf5f2f33806f7c124904c14967"},{"key":"22_CR20","unstructured":"Hu, E.J., et\u00a0al.: LoRA: low-rank adaptation of large language models (2021). https:\/\/arxiv.org\/abs\/2106.09685v2"},{"key":"22_CR21","doi-asserted-by":"publisher","unstructured":"Hu, J., Zhang, Q., Yin, H.: Augmenting greybox fuzzing with generative AI (2023). https:\/\/doi.org\/10.48550\/arXiv.2306.06782, arXiv:2306.06782","DOI":"10.48550\/arXiv.2306.06782"},{"key":"22_CR22","unstructured":"Hu, S., et\u00a0al.: Large language model-powered smart contract vulnerability detection: new perspectives (2023). http:\/\/arxiv.org\/abs\/2310.01152, arXiv:2310.01152"},{"key":"22_CR23","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/978-981-97-5101-3_23","volume-title":"Information security and privacy","author":"P Ince","year":"2024","unstructured":"Ince, P., et al.: Detect llama - finding vulnerabilities in smart contracts using large language models. In: Zhu, T., Li, Y. (eds.) Information security and privacy, pp. 424\u2013443. Springer Nature Singapore, Singapore (2024)"},{"key":"22_CR24","doi-asserted-by":"publisher","unstructured":"Jiang, A.Q., et\u00a0al.: Mixtral of Experts (2024). https:\/\/doi.org\/10.48550\/arXiv.2401.04088, arXiv:2401.04088","DOI":"10.48550\/arXiv.2401.04088"},{"key":"22_CR25","unstructured":"Kocetkov, D., et\u00a0al.: The Stack: 3 TB of permissively licensed source code. Preprint (2022)"},{"key":"22_CR26","doi-asserted-by":"publisher","unstructured":"Lewis, M., et\u00a0al.: BART: Denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension (2019). https:\/\/doi.org\/10.48550\/arXiv.1910.13461, arXiv:1910.13461","DOI":"10.48550\/arXiv.1910.13461"},{"key":"22_CR27","unstructured":"Lewis, P., et\u00a0al.: Retrieval-augmented generation for knowledge-intensive NLP tasks. In: Advances in Neural Information Processing Systems. vol.\u00a033, pp. 9459\u20139474. Curran Associates, Inc. (2020). https:\/\/proceedings.neurips.cc\/paper\/2020\/hash\/6b493230205f780e1bc26945df7481e5-Abstract.html"},{"key":"22_CR28","doi-asserted-by":"publisher","unstructured":"Li, R., et\u00a0al.: StarCoder: may the source be with you! (2023). https:\/\/doi.org\/10.48550\/arXiv.2305.06161, arXiv:2305.06161","DOI":"10.48550\/arXiv.2305.06161"},{"key":"22_CR29","unstructured":"Liu, Y., et\u00a0al.: PropertyGPT: Evaluation data (2024). https:\/\/github.com\/Pr0pertyGPT\/PropertyGPT\/tree\/main"},{"key":"22_CR30","doi-asserted-by":"publisher","unstructured":"Liu, Z., et\u00a0al.: Smart contract vulnerability detection: from pure neural network to interpretable graph feature and expert pattern fusion (2021). https:\/\/doi.org\/10.48550\/arXiv.2106.09282, arXiv:2106.09282","DOI":"10.48550\/arXiv.2106.09282"},{"key":"22_CR31","doi-asserted-by":"publisher","unstructured":"Luu, L., et\u00a0al.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269. CCS \u201916, Association for Computing Machinery, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2976749.2978309","DOI":"10.1145\/2976749.2978309"},{"key":"22_CR32","doi-asserted-by":"publisher","unstructured":"Ma, W., et\u00a0al.: Combining fine-tuning and LLM-based agents for intuitive smart contract auditing with justifications (2024). https:\/\/doi.org\/10.48550\/arXiv.2403.16073","DOI":"10.48550\/arXiv.2403.16073"},{"key":"22_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L de Moura","year":"2008","unstructured":"de Moura, L., Bj\u00f8rner, N.: Z3: An Efficient SMT Solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78800-3_24"},{"key":"22_CR34","doi-asserted-by":"publisher","unstructured":"Nicholls, J., Kuppa, A., Le-Khac, N.A.: Enhancing illicit activity detection using XAI: a multimodal graph-LLM framework (2023).https:\/\/doi.org\/10.48550\/arXiv.2310.13787, arXiv:2310.13787","DOI":"10.48550\/arXiv.2310.13787"},{"key":"22_CR35","unstructured":"OpenAI: Introducing ChatGPT (2022). https:\/\/openai.com\/index\/chatgpt\/"},{"key":"22_CR36","doi-asserted-by":"publisher","unstructured":"OpenAI: GPT-4 Technical Report (2023). https:\/\/doi.org\/10.48550\/arXiv.2303.08774, arXiv:2303.08774","DOI":"10.48550\/arXiv.2303.08774"},{"key":"22_CR37","unstructured":"OpenAI: Hello GPT-4o (2024). https:\/\/openai.com\/index\/hello-gpt-4o\/"},{"key":"22_CR38","doi-asserted-by":"publisher","unstructured":"Ouyang, L., et\u00a0al.: Training language models to follow instructions with human feedback (2022). https:\/\/doi.org\/10.48550\/arXiv.2203.02155, arXiv:2203.02155","DOI":"10.48550\/arXiv.2203.02155"},{"key":"22_CR39","unstructured":"Peng, A., et\u00a0al.: GPT-3.5 Turbo fine-tuning and API updates (2023). https:\/\/openai.com\/blog\/gpt-3-5-turbo-fine-tuning-and-api-updates"},{"key":"22_CR40","unstructured":"Qian, P.: Messi-Q\/Smart-Contract-Dataset (resource 2) (2024). https:\/\/github.com\/Messi-Q\/Smart-Contract-Dataset"},{"key":"22_CR41","unstructured":"Radford, A., et\u00a0al.: Improving Language Understanding by Generative Pre-Training (2018)"},{"key":"22_CR42","unstructured":"Radford, A., et\u00a0al.: Language models are unsupervised multitask learners (2019)"},{"key":"22_CR43","unstructured":"Rozi\u00e8re, B., et\u00a0al.: Code Llama: Open Foundation Models for Code (2023). https:\/\/arxiv.org\/abs\/2308.12950v2"},{"key":"22_CR44","unstructured":"Salzer, G., et\u00a0al.: Smartbugs - Smartbugs Curated (2023). https:\/\/github.com\/smartbugs\/smartbugs-curated"},{"key":"22_CR45","doi-asserted-by":"publisher","unstructured":"Sennrich, R., Haddow, B., Birch, A.: Neural machine translation of rare words with subword units (2016). https:\/\/doi.org\/10.48550\/arXiv.1508.07909, arXiv:1508.07909","DOI":"10.48550\/arXiv.1508.07909"},{"key":"22_CR46","doi-asserted-by":"publisher","unstructured":"Shin, S., et\u00a0al.: On the effect of pretraining corpora on in-context learning by a large-scale language model. In: Carpuat, M., de\u00a0Marneffe, M.C., Meza\u00a0Ruiz, I.V. (eds.) Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 5168\u20135186. Association for Computational Linguistics, Seattle, United States (2022). https:\/\/doi.org\/10.18653\/v1\/2022.naacl-main.380","DOI":"10.18653\/v1\/2022.naacl-main.380"},{"key":"22_CR47","doi-asserted-by":"publisher","unstructured":"Shou, C., et\u00a0al.: LLM4Fuzz: guided fuzzing of smart contracts with large language models (2024). https:\/\/doi.org\/10.48550\/arXiv.2401.11108, arXiv:2401.11108","DOI":"10.48550\/arXiv.2401.11108"},{"key":"22_CR48","doi-asserted-by":"crossref","unstructured":"Shou, C., Tan, S., Sen, K.: ItyFuzz: snapshot-based fuzzer for smart contract. In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 322\u2013333. ISSTA 2023, Association for Computing Machinery, New York, NY, USA (2023)","DOI":"10.1145\/3597926.3598059"},{"key":"22_CR49","unstructured":"Solodit: Solodit - all findings from popular audit platforms. https:\/\/solodit.xyz\/"},{"key":"22_CR50","doi-asserted-by":"publisher","DOI":"10.6084\/m9.figshare.21990287.v2","author":"A Storhaug","year":"2023","unstructured":"Storhaug, A.: Vulnerable verified smart contracts (2023). https:\/\/doi.org\/10.6084\/m9.figshare.21990287.v2","journal-title":"Vulnerable verified smart contracts"},{"key":"22_CR51","doi-asserted-by":"publisher","unstructured":"Storhaug, A., Li, J., Hu, T.: Efficient avoidance of vulnerabilities in auto-completed smart contract code using vulnerability-constrained decoding. In: 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE), pp. 683\u2013693 (2023). https:\/\/doi.org\/10.1109\/ISSRE59848.2023.00035, iSSN: 2332-6549","DOI":"10.1109\/ISSRE59848.2023.00035"},{"key":"22_CR52","doi-asserted-by":"publisher","unstructured":"Su, J., et\u00a0al.: Effectively generating vulnerable transaction sequences in smart contracts with reinforcement learning-guided fuzzing. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1\u201312. ASE \u201922, Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3551349.3560429","DOI":"10.1145\/3551349.3560429"},{"key":"22_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103423","volume":"73","author":"X Sun","year":"2023","unstructured":"Sun, X., et al.: ASSert: active and semi-supervised bert for smart contract vulnerability detection. J. Inf. Secur. Appl. 73, 103423 (2023). https:\/\/doi.org\/10.1016\/j.jisa.2023.103423","journal-title":"J. Inf. Secur. Appl."},{"key":"22_CR54","doi-asserted-by":"publisher","unstructured":"Sun, Y., et\u00a0al.: LLM4Vuln: a unified evaluation framework for decoupling and enhancing LLMs\u2019 vulnerability reasoning (2024). https:\/\/doi.org\/10.48550\/arXiv.2401.16185, arXiv:2401.16185","DOI":"10.48550\/arXiv.2401.16185"},{"key":"22_CR55","doi-asserted-by":"publisher","unstructured":"Sun, Y., et\u00a0al.: When GPT meets program analysis: towards intelligent detection of smart contract logic vulnerabilities in GPTScan (2023). https:\/\/doi.org\/10.48550\/arXiv.2308.03314, arXiv:2308.03314","DOI":"10.48550\/arXiv.2308.03314"},{"issue":"10","key":"22_CR56","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/fi15100326","volume":"15","author":"Z Szab\u00f3","year":"2023","unstructured":"Szab\u00f3, Z., Bilicki, V.: A new approach to web application security: utilizing GPT language models for source code inspection. Fut. Internet 15(10), 326 (2023). https:\/\/doi.org\/10.3390\/fi15100326","journal-title":"Fut. Internet"},{"key":"22_CR57","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.procs.2023.12.151","volume":"231","author":"F \u00d6zdemir S\u00f6nmez","year":"2024","unstructured":"\u00d6zdemir S\u00f6nmez, F., Knottenbelt, W.J.: ContractArmor: attack surface generator for smart contracts. Procedia Comput. Sci. 231, 8\u201315 (2024). https:\/\/doi.org\/10.1016\/j.procs.2023.12.151","journal-title":"Procedia Comput. Sci."},{"key":"22_CR58","unstructured":"Taori, R., et\u00a0al.: Alpaca: a strong, replicable instruction-following model. https:\/\/crfm.stanford.edu\/2023\/03\/13\/alpaca.html"},{"key":"22_CR59","doi-asserted-by":"publisher","unstructured":"Tikhomirov, S., et\u00a0al.: SmartCheck: static analysis of ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 9\u201316. WETSEB \u201918, Association for Computing Machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3194113.3194115","DOI":"10.1145\/3194113.3194115"},{"key":"22_CR60","doi-asserted-by":"publisher","unstructured":"Torres, C.F., Sch\u00fctte, J., State, R.: Osiris: hunting for integer bugs in ethereum smart contracts. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 664\u2013676. ACSAC \u201918, Association for Computing Machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3274694.3274737","DOI":"10.1145\/3274694.3274737"},{"key":"22_CR61","doi-asserted-by":"publisher","unstructured":"Touvron, H., et\u00a0al.: Llama 2: open foundation and fine-tuned chat models (2023). https:\/\/doi.org\/10.48550\/arXiv.2307.09288, arXiv:2307.09288","DOI":"10.48550\/arXiv.2307.09288"},{"key":"22_CR62","doi-asserted-by":"publisher","unstructured":"Vaswani, A., et\u00a0al.: Attention is all you need (2017). https:\/\/doi.org\/10.48550\/arXiv.1706.03762, arXiv:1706.03762","DOI":"10.48550\/arXiv.1706.03762"},{"key":"22_CR63","doi-asserted-by":"publisher","unstructured":"Wang, Y., et\u00a0al.: Generalizing from a few examples: a survey on few-shot learning. ACM Comput. Surv. 53(3), 63:1\u201363:34 (2020). https:\/\/doi.org\/10.1145\/3386252","DOI":"10.1145\/3386252"},{"key":"22_CR64","doi-asserted-by":"publisher","unstructured":"Wang, Y., et\u00a0al.: CodeT5: identifier-aware unified pre-trained encoder-decoder models for code understanding and generation (2021). https:\/\/doi.org\/10.48550\/arXiv.2109.00859, arXiv:2109.00859","DOI":"10.48550\/arXiv.2109.00859"},{"key":"22_CR65","unstructured":"Wei, J., et\u00a0al.: Chain-of-thought prompting elicits reasoning in large language models. Adv. Neural Inf. Process. Syst. 35, 24824\u201324837 (2022). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2022\/hash\/9d5609613524ecf4f15af0f7b31abca4-Abstract-Conference.html"},{"key":"22_CR66","doi-asserted-by":"publisher","unstructured":"Xia, S., et\u00a0al.: AuditGPT: auditing smart contracts with ChatGPT (2024). https:\/\/doi.org\/10.48550\/arXiv.2404.04306, arXiv:2404.04306","DOI":"10.48550\/arXiv.2404.04306"},{"key":"22_CR67","doi-asserted-by":"publisher","unstructured":"Xu, G., Liu, L., Dong, J.: Vulnerability detection of ethereum smart contract based on SolBERT-BiGRU-attention hybrid neural model. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES 137(1), 903\u2013922 (2023). https:\/\/doi.org\/10.32604\/cmes.2023.026627","DOI":"10.32604\/cmes.2023.026627"},{"key":"22_CR68","doi-asserted-by":"publisher","unstructured":"Yang, Z., Man, G., Yue, S.: Automated smart contract vulnerability detection using fine-tuned large language models. In: Proceedings of the 2023 6th International Conference on Blockchain Technology and Applications, pp. 19\u201323. ICBTA \u201923, Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3651655.3651658","DOI":"10.1145\/3651655.3651658"},{"key":"22_CR69","doi-asserted-by":"publisher","unstructured":"Yashavant, C.S., Kumar, S., Karkare, A.: ScrawlD: a dataset of real world ethereum smart contracts labelled with vulnerabilities (2022). https:\/\/doi.org\/10.48550\/arXiv.2202.11409, arXiv:2202.11409","DOI":"10.48550\/arXiv.2202.11409"},{"key":"22_CR70","doi-asserted-by":"publisher","unstructured":"Yu, L., et\u00a0al.: PSCVFinder: a prompt-tuning based framework for smart contract vulnerability detection. In: 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE), pp. 556\u2013567 (2023). https:\/\/doi.org\/10.1109\/ISSRE59848.2023.00030, iSSN: 2332-6549","DOI":"10.1109\/ISSRE59848.2023.00030"},{"key":"22_CR71","doi-asserted-by":"publisher","unstructured":"Zeng, S., et\u00a0al.: SolGPT: A GPT-Based static vulnerability detection model for enhancing smart contract security. In: Tari, Z., Li, K., Wu, H. (eds.) Algorithms and Architectures for Parallel Processing, pp. 42\u201362. Springer Nature, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-97-0859-8_3","DOI":"10.1007\/978-981-97-0859-8_3"},{"key":"22_CR72","doi-asserted-by":"publisher","unstructured":"Zhang, L., et\u00a0al.: ACFIX: guiding LLMs with mined common RBAC practices for context-aware repair of access control vulnerabilities in smart contracts (2024).https:\/\/doi.org\/10.48550\/arXiv.2403.06838, arXiv:2403.06838","DOI":"10.48550\/arXiv.2403.06838"},{"key":"22_CR73","doi-asserted-by":"publisher","unstructured":"Zhu, Y., et\u00a0al.: Can Large Language Models Understand Context? (2024). https:\/\/doi.org\/10.48550\/arXiv.2402.00858, arXiv:2402.00858","DOI":"10.48550\/arXiv.2402.00858"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2961-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:48:13Z","timestamp":1772196493000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2961-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"ISBN":["9789819529605","9789819529612"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2961-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"10 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yokohama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/provsec2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}