{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:17:41Z","timestamp":1742977061560,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":47,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819606016"},{"type":"electronic","value":"9789819606023"}],"license":[{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0602-3_6","type":"book-chapter","created":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T03:46:28Z","timestamp":1732419988000},"page":"102-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Can Language Models Pretend Solvers? Logic Code Simulation with\u00a0LLMs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3406-7520","authenticated-orcid":false,"given":"Minyu","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9005-7112","authenticated-orcid":false,"given":"Guoqiang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8259-2200","authenticated-orcid":false,"given":"Ling-I","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2698-1836","authenticated-orcid":false,"given":"Ruibang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6886-5173","authenticated-orcid":false,"given":"Yuxin","family":"Su","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9212-9810","authenticated-orcid":false,"given":"Xi","family":"Chang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6115-6506","authenticated-orcid":false,"given":"Jianxin","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,25]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-030-99524-9_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"H Barbosa","year":"2022","unstructured":"Barbosa, H., et al.: cvc5: a versatile and industrial-strength SMT solver. In: Fisman, D., Rosu, G. (eds.) TACAS 2022. LNCS, vol. 13243, pp. 415\u2013442. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99524-9_24"},{"key":"6_CR2","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-031-30820-8_29","volume-title":"TACAS 2023","author":"D Beyer","year":"2023","unstructured":"Beyer, D.: Competition on software verification and witness validation: SV-COMP 2023. In: Sankaranarayanan, S., Sharygina, N. (eds.) TACAS 2023. LNCS, vol. 13994, pp. 495\u2013522. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30820-8_29"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-030-17601-3_4","volume-title":"Engineering Trustworthy Software Systems","author":"N Bj\u00f8rner","year":"2019","unstructured":"Bj\u00f8rner, N., de Moura, L., Nachmanson, L., Wintersteiger, C.M.: Programming Z3. In: Bowen, J.P., Liu, Z., Zhang, Z. (eds.) SETSS 2018. LNCS, vol. 11430, pp. 148\u2013201. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17601-3_4"},{"key":"6_CR4","unstructured":"Brown, T., et al.: Language models are few-shot learners. In: Advances in Neural Information Processing Systems, vol. 33, pp. 1877\u20131901 (2020)"},{"key":"6_CR5","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-031-13188-2_12","volume-title":"CAV 2022","author":"S Cai","year":"2022","unstructured":"Cai, S., Li, B., Zhang, X.: Local search for SMT on linear integer arithmetic. In: Shoham, S., Vizel, Y. (eds.) CAV 2022. LNCS, vol. 13372, pp. 227\u2013248. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-13188-2_12"},{"key":"6_CR6","unstructured":"Chen, X., Chi, R.A., Wang, X., Zhou, D.: Premise order matters in reasoning with large language models. arXiv preprint arXiv:2402.08939 (2024)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Cordeiro, L., Fischer, B.: Verifying multi-threaded software using SMT-based context-bounded model checking. In: Proceedings of the 33rd International Conference on Software Engineering, pp. 331\u2013340 (2011)","DOI":"10.1145\/1985793.1985839"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L de Moura","year":"2008","unstructured":"de Moura, L., Bj\u00f8rner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78800-3_24"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Deng, Y., Xia, C.S., Yang, C., Zhang, S.D., Yang, S., Zhang, L.: Large language models are edge-case generators: crafting unusual programs for fuzzing deep learning libraries. In: Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering, pp. 1\u201313 (2024)","DOI":"10.1145\/3597503.3623343"},{"key":"6_CR10","unstructured":"Feng, J., et al.: Language models can be logical solvers. arXiv preprint arXiv:2311.06158 (2023)"},{"key":"6_CR11","unstructured":"Gadelha, M.R., Steffinlongo, E., Cordeiro, L.C., Fischer, B., Nicole, D.: SMT-based refutation of spurious bug reports in the clang static analyzer. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), pp. 11\u201314. IEEE (2019)"},{"key":"6_CR12","unstructured":"Giannou, A., Rajput, S., Sohn, J., Lee, K., Lee, J.D., Papailiopoulos, D.: Looped transformers as programmable computers. In: International Conference on Machine Learning, pp. 11398\u201311442. PMLR (2023)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Gupta, P., et al.: Grace: language models meet code edits. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1483\u20131495 (2023)","DOI":"10.1145\/3611643.3616253"},{"key":"6_CR14","unstructured":"Han, S., et\u00a0al.: Folio: natural language reasoning with first-order logic. arXiv preprint arXiv:2209.00840 (2022)"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-030-25540-4_12","volume-title":"Computer Aided Verification","author":"E Kang","year":"2019","unstructured":"Kang, E., Lafortune, S., Tripakis, S.: Automated synthesis of secure platform mappings. In: Dillig, I., Tasiran, S. (eds.) CAV 2019. LNCS, vol. 11561, pp. 219\u2013237. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25540-4_12"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Kazemi, M., Kim, N., Bhatia, D., Xu, X., Ramachandran, D.: Lambada: backward chaining for automated reasoning in natural language. arXiv preprint arXiv:2212.13894 (2022)","DOI":"10.18653\/v1\/2023.acl-long.361"},{"key":"6_CR17","unstructured":"Kim, G., Baldi, P., McAleer, S.: Language models can solve computer tasks. In: Advances in Neural Information Processing Systems, vol. 36 (2024)"},{"key":"6_CR18","unstructured":"La\u00a0Malfa, E., et al.: Code simulation challenges for large language models. arXiv preprint arXiv:2401.09074 (2024)"},{"key":"6_CR19","unstructured":"Lee, J., Hwang, W.: Symba: symbolic backward chaining for multi-step natural language reasoning. arXiv preprint arXiv:2402.12806 (2024)"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: LLMs for relational reasoning: How far are we? arXiv preprint arXiv:2401.09042 (2024)","DOI":"10.1145\/3643795.3648387"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Liu, C., et al.: Code execution with pre-trained language models. In: Findings of the Association for Computational Linguistics: ACL 2023, pp. 4984\u20134999 (2023)","DOI":"10.18653\/v1\/2023.findings-acl.308"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Liu, M., Yang, T., Lou, Y., Du, X., Wang, Y., Peng, X.: Codegen4libs: a two-stage approach for library-oriented code generation. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 434\u2013445. IEEE (2023)","DOI":"10.1109\/ASE56229.2023.00159"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Ma, L., et al.: Knowlog: knowledge enhanced pre-trained language model for log understanding. In: Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering, pp. 1\u201313 (2024)","DOI":"10.1145\/3597503.3623304"},{"key":"6_CR24","doi-asserted-by":"publisher","unstructured":"Min, S., et al.: Rethinking the role of demonstrations: What makes in-context learning work? In: Goldberg, Y., Kozareva, Z., Zhang, Y. (eds.) Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, pp. 11048\u201311064. Association for Computational Linguistics, Abu Dhabi, United Arab Emirates (2022). https:\/\/doi.org\/10.18653\/v1\/2022.emnlp-main.759. https:\/\/aclanthology.org\/2022.emnlp-main.759","DOI":"10.18653\/v1\/2022.emnlp-main.759"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Pan, L., Albalak, A., Wang, X., Wang, W.: Logic-LM: empowering large language models with symbolic solvers for faithful logical reasoning. In: Findings of the Association for Computational Linguistics: EMNLP 2023, pp. 3806\u20133824 (2023)","DOI":"10.18653\/v1\/2023.findings-emnlp.248"},{"issue":"75","key":"6_CR26","first-page":"1","volume":"22","author":"J P\u00e9rez","year":"2021","unstructured":"P\u00e9rez, J., Barcel\u00f3, P., Marinkovic, J.: Attention is turing-complete. J. Mach. Learn. Res. 22(75), 1\u201335 (2021)","journal-title":"J. Mach. Learn. Res."},{"key":"6_CR27","unstructured":"Roziere, B., et\u00a0al.: Code llama: open foundation models for code. arXiv preprint arXiv:2308.12950 (2023)"},{"key":"6_CR28","unstructured":"Saparov, A., He, H.: Language models are greedy reasoners: a systematic formal analysis of chain-of-thought. In: The Eleventh International Conference on Learning Representations (2023). https:\/\/openreview.net\/forum?id=qFVVBzXxR2V"},{"key":"6_CR29","unstructured":"Schuurmans, D.: Memory augmented large language models are computationally universal. arXiv preprint arXiv:2301.04589 (2023)"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Shi, Z., et al.: Satformer: transformer-based unsat core learning. In: 2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD), pp.\u00a01\u20134. IEEE (2023)","DOI":"10.1109\/ICCAD57390.2023.10323731"},{"issue":"2","key":"6_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3381032","volume":"29","author":"G Soltana","year":"2020","unstructured":"Soltana, G., Sabetzadeh, M., Briand, L.C.: Practical constraint solving for generating system test data. ACM Trans. Softw. Eng. Methodol. (TOSEM) 29(2), 1\u201348 (2020)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Sun, M., Yang, Y., Wang, Y., Wen, M., Jia, H., Zhou, Y.: SMT solver validation empowered by large pre-trained language models. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1288\u20131300. IEEE (2023)","DOI":"10.1109\/ASE56229.2023.00180"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Sun, Y., et al.: GPTScan: detecting logic vulnerabilities in smart contracts by combining GPT with program analysis. In: Proceedings of the IEEE\/ACM ICSE (2024)","DOI":"10.1145\/3597503.3639117"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Tafjord, O., Dalvi, B., Clark, P.: Proofwriter: generating implications, proofs, and abductive statements over natural language. In: Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021, pp. 3621\u20133634 (2021)","DOI":"10.18653\/v1\/2021.findings-acl.317"},{"key":"6_CR35","unstructured":"Touvron, H., S., et\u00a0al.: Llama 2: open foundation and fine-tuned chat models. arXiv preprint arXiv:2307.09288 (2023)"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Wang, C., Lou, Y., Liu, J., Peng, X.: Generating variable explanations via zero-shot prompt learning. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 748\u2013760. IEEE (2023)","DOI":"10.1109\/ASE56229.2023.00130"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Wang, L., et al.: Plan-and-solve prompting: Improving zero-shot chain-of-thought reasoning by large language models. In: Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 2609\u20132634 (2023)","DOI":"10.18653\/v1\/2023.acl-long.147"},{"key":"6_CR38","unstructured":"Wang, X., et al.: Self-consistency improves chain of thought reasoning in language models. In: The Eleventh International Conference on Learning Representations (2022)"},{"key":"6_CR39","unstructured":"Wei, C., Chen, Y., Ma, T.: Statistically meaningful approximation: a case study on approximating turing machines with transformers. In: Advances in Neural Information Processing Systems, vol. 35, pp. 12071\u201312083 (2022)"},{"key":"6_CR40","unstructured":"Wei, J., et al.: Chain-of-thought prompting elicits reasoning in large language models. In: Advances in Neural Information Processing Systems, vol. 35, pp. 24824\u201324837 (2022)"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Xu, J., et\u00a0al.: Unilog: automatic logging via LLM and in-context learning. In: Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering, pp. 1\u201312 (2024)","DOI":"10.1145\/3597503.3623326"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Yang, A.Z., Le\u00a0Goues, C., Martins, R., Hellendoorn, V.: Large language models for test-free fault localization. In: Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering, pp. 1\u201312 (2024)","DOI":"10.1145\/3597503.3623342"},{"key":"6_CR43","unstructured":"Ye, X., Chen, Q., Dillig, I., Durrett, G.: SatLM: satisfiability-aided language models using declarative prompting. In: Advances in Neural Information Processing Systems, vol. 36 (2024)"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Yu, H., et al.: Codereval: a benchmark of pragmatic code generation with generative pre-trained models. In: Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering, pp. 1\u201312 (2024)","DOI":"10.1145\/3597503.3623316"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Zhang, S., Gu, X., Chen, Y., Shen, B.: Infere: step-by-step regex generation via chain of inference. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1505\u20131515. IEEE (2023)","DOI":"10.1109\/ASE56229.2023.00111"},{"key":"6_CR46","unstructured":"Zhang, Y., Zhen, H.L., Pei, Z., Lian, Y., Yin, L., Yuan, M., Yu, B.: Sola: solver-layer adaption of LLM for better logic reasoning. arXiv preprint arXiv:2402.11903 (2024)"},{"key":"6_CR47","doi-asserted-by":"crossref","unstructured":"Zhong, W., et al.: Analytical reasoning of text. In: Findings of the Association for Computational Linguistics: NAACL 2022, pp. 2306\u20132319 (2022)","DOI":"10.18653\/v1\/2022.findings-naacl.177"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering. Theories, Tools, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0602-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T04:19:11Z","timestamp":1732421951000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0602-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,25]]},"ISBN":["9789819606016","9789819606023"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0602-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,25]]},"assertion":[{"value":"25 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SETTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Dependable Software Engineering: Theories, Tools, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"setta2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/setta2024.cs.cityu.edu.hk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}