{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T21:25:11Z","timestamp":1773350711131,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T00:00:00Z","timestamp":1701907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,7]]},"DOI":"10.1145\/3628797.3628945","type":"proceedings-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T15:25:34Z","timestamp":1701876334000},"page":"739-745","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Contextual Language Model and Transfer Learning for Reentrancy Vulnerability Detection in Smart Contracts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3386-0057","authenticated-orcid":false,"given":"B\u1eb1ng","family":"L\u00ea H\u1ed3ng","sequence":"first","affiliation":[{"name":"University of Information Technology, Ho Chi Minh City, Vietnam, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7326-1993","authenticated-orcid":false,"given":"Th\u1eafng","family":"L\u00ea \u0110\u1ee9c","sequence":"additional","affiliation":[{"name":"University of Information Technology, Ho Chi Minh City, Vietnam, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4880-5214","authenticated-orcid":false,"given":"Trung","family":"\u0110o\u00e0n Minh","sequence":"additional","affiliation":[{"name":"University of Information Technology, Ho Chi Minh City, Vietnam, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1156-7072","authenticated-orcid":false,"given":"D\u0169ng","family":"Tr\u1ea7n Tu\u1ea5n","sequence":"additional","affiliation":[{"name":"University of Information Technology, Ho Chi Minh City, Vietnam, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5945-3712","authenticated-orcid":false,"given":"Duy","family":"Phan Th\u1ebf","sequence":"additional","affiliation":[{"name":"University of Information Technology, Ho Chi Minh City, Vietnam, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3147-3356","authenticated-orcid":false,"given":"H\u1eadu","family":"Ph\u1ea1m V\u0103n","sequence":"additional","affiliation":[{"name":"University of Information Technology, Ho Chi Minh City, Vietnam, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2023,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. The Dao Attack. https:\/\/en.wikipedia.org\/wiki\/The_DAO_(organization)"},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Ethereum Parity Bug. https:\/\/mashable.com\/article\/ethereum-parity-bug"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00048"},{"key":"e_1_3_2_1_4_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. ArXiv abs\/1810.04805","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. ArXiv abs\/1810.04805 (2019)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380364"},{"key":"e_1_3_2_1_6_1","volume-title":"CodeBERT: A Pre-Trained Model for Programming and Natural Languages. ArXiv abs\/2002.08155","author":"Feng Zhangyin","year":"2020","unstructured":"Zhangyin Feng, Daya Guo, Duyu Tang, Nan Duan, Xiaocheng Feng, Ming Gong, Linjun Shou, Bing Qin, Ting Liu, Daxin Jiang, and Ming Zhou. 2020. CodeBERT: A Pre-Trained Model for Programming and Natural Languages. ArXiv abs\/2002.08155 (2020)."},{"key":"e_1_3_2_1_7_1","unstructured":"Gavin Wood. [n.d.]. [n. d.]. Ethereum: A secure decentralised generalised transaction ledger Byzantium Version. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"Sowon Jeon Gilhee Lee Hyoungshick Kim and Simon\u00a0S. Woo. 2021. SmartConDetect: Highly Accurate Smart Contract Code Vulnerability Detection Mechanism using BERT."},{"key":"e_1_3_2_1_9_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Decentralized business review","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized business review (2008), 21260."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969429"},{"key":"e_1_3_2_1_11_1","unstructured":"Martina Rossini. 2022. Slither Audited Smart Contracts Dataset."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE50093.2020.9050260"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB52558.2021.00010"},{"key":"e_1_3_2_1_14_1","volume-title":"a distilled version of BERT: smaller, faster, cheaper and lighter. ArXiv abs\/1910.01108","author":"Sanh Victor","year":"2019","unstructured":"Victor Sanh, Lysandre Debut, Julien Chaumond, and Thomas Wolf. 2019. DistilBERT, a distilled version of BERT: smaller, faster, cheaper and lighter. ArXiv abs\/1910.01108 (2019)."},{"key":"e_1_3_2_1_15_1","volume-title":"Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.. In NDSS.","author":"Sendner Christoph","year":"2023","unstructured":"Christoph Sendner, Huili Chen, Hossein Fereidooni, Lukas Petzi, Jan K\u00f6nig, Jasper Stang, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, and Farinaz Koushanfar. 2023. Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.. In NDSS."},{"key":"e_1_3_2_1_16_1","volume-title":"Journal of Physics: Conference Series, Vol.\u00a01820","author":"Sun Yuhang","year":"2004","unstructured":"Yuhang Sun and Lize Gu. 2021. Attention-based machine learning model for smart contract vulnerability detection. In Journal of Physics: Conference Series, Vol.\u00a01820. IOP Publishing, 012004."},{"key":"e_1_3_2_1_17_1","volume-title":"Towards safer smart contracts: A sequence learning approach to detecting security threats. arXiv preprint arXiv:1811.06632","author":"Joon-Wie Tann Wesley","year":"2018","unstructured":"Wesley Joon-Wie Tann, Xing\u00a0Jie Han, Sourav\u00a0Sen Gupta, and Yew-Soon Ong. 2018. Towards safer smart contracts: A sequence learning approach to detecting security threats. arXiv preprint arXiv:1811.06632 (2018)."},{"key":"e_1_3_2_1_18_1","volume-title":"Attention is all you need. Advances in neural information processing systems 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_19_1","volume-title":"WANA: Symbolic execution of wasm bytecode for cross-platform smart contract vulnerability detection. arXiv preprint arXiv:2007.15510","author":"Wang Dong","year":"2020","unstructured":"Dong Wang, Bo Jiang, and WK Chan. 2020. WANA: Symbolic execution of wasm bytecode for cross-platform smart contract vulnerability detection. arXiv preprint arXiv:2007.15510 (2020)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00047"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942301"}],"event":{"name":"SOICT 2023: The 12th International Symposium on Information and Communication Technology","location":"Ho Chi Minh Vietnam","acronym":"SOICT 2023"},"container-title":["Proceedings of the 12th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628797.3628945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3628797.3628945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:25:12Z","timestamp":1755779112000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628797.3628945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,7]]},"references-count":21,"alternative-id":["10.1145\/3628797.3628945","10.1145\/3628797"],"URL":"https:\/\/doi.org\/10.1145\/3628797.3628945","relation":{},"subject":[],"published":{"date-parts":[[2023,12,7]]},"assertion":[{"value":"2023-12-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}