{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:04:53Z","timestamp":1772240693805,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1145\/3651655.3651658","type":"proceedings-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T16:13:56Z","timestamp":1716999236000},"page":"19-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Automated Smart Contract Vulnerability Detection using Fine-tuned Large Language Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2831-7424","authenticated-orcid":false,"given":"Zhiju","family":"Yang","sequence":"first","affiliation":[{"name":"Seattle University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4665-9014","authenticated-orcid":false,"given":"Gaoyuan","family":"Man","sequence":"additional","affiliation":[{"name":"Arizona State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8213-287X","authenticated-orcid":false,"given":"Songqing","family":"Yue","sequence":"additional","affiliation":[{"name":"University of Wisconsin - Platteville, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179435"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416553"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Zhang Zhuo Brian Zhang Wen Xu and Zhiqiang Lin. \"Demystifying Exploitable Bugs in Smart Contracts.\" ICSE 2023.","DOI":"10.1109\/ICSE48619.2023.00061"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"e_1_3_2_1_8_1","volume-title":"Vandal: A scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981","author":"Brent Lexi","year":"2018","unstructured":"Lexi Brent, Anton Jurisevic, Michael Kong, Eric Liu, Francois Gauthier, Vincent Gramoli, Ralph Holz, and Bernhard Scholz. 2018. Vandal: A scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981 (2018)."},{"key":"e_1_3_2_1_9_1","unstructured":"Hugo Touvron Louis Martin Kevin Stone Peter Albert Amjad Almahairi Yasmine Babaei Nikolay Bashlykov Soumya Batra Prajjwal"},{"key":"e_1_3_2_1_10_1","volume-title":"Llama 2: Open foundation and fine-tuned chat models. arXiv preprint arXiv:2307.09288","author":"Bhosale Shruti","year":"2023","unstructured":"Bhargava, Shruti Bhosale, Llama 2: Open foundation and fine-tuned chat models. arXiv preprint arXiv:2307.09288, 2023."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Ali M Son DH Kang SH Nam SR. An accurate CT saturation classification using a deep learning approach based on unsupervised feature extraction and supervised fine-tuning strategy. Energies. 2017 Nov 10;10(11):1830.","DOI":"10.3390\/en10111830"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942301"},{"key":"e_1_3_2_1_16_1","first-page":"82","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201918","author":"Tsankov Petar","unstructured":"Petar Tsankov, Andrei Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian B\u00fcnzli, and Martin Vechev. Securify: Practical security analysis of smart contracts. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201918, page 67\u201382"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3415298"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183495"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32409-4_18"},{"key":"e_1_3_2_1_22_1","first-page":"1333","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Krupp J.","year":"2018","unstructured":"J. Krupp and C. Rossow, \u201cteEther: Gnawing at Ethereum to automatically exploit smart contracts,\u201d in 27th USENIX Security Symposium (USENIX Security 18), pp. 1317\u20131333, 2018."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"Zeus: analyzing safety of smart contracts","author":"Kalra S.","year":"2018","unstructured":"S. Kalra, S. Goel, M. Dhawan, and S. Sharma, \u201cZeus: analyzing safety of smart contracts.,\u201d in Ndss, pp. 1\u201312, 2018.","journal-title":"Ndss"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00022"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264591"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96145-3_4"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications.","author":"Man Gaoyuan","year":"2022","unstructured":"Yang, Zhiju, Gaoyuan Man, and Songqing Yue. \"Understanding Security Audits on Blockchain.\" Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications. 2022."},{"key":"e_1_3_2_1_29_1","unstructured":"Mangrulkar SO Gugger S Debut L Belkada Y Paul S. PEFT: State-of-the-art parameter-efficient fine-tuning methods."},{"key":"e_1_3_2_1_30_1","unstructured":"AutoTrain Advanced 2023. https:\/\/github.com\/huggingface\/autotrain-advanced"},{"key":"e_1_3_2_1_31_1","unstructured":"CertiK Security Audit 2023. https:\/\/www.certik.com\/products\/security-audit."},{"key":"e_1_3_2_1_32_1","unstructured":"Discover the World's Top Smart Contract Auditing Companies 2023. https:\/\/smartcontractaudits.com\/audit-providers\/companies\/1."},{"key":"e_1_3_2_1_33_1","unstructured":"ChatGPT 2023. https:\/\/openai.com\/blog\/chatgpt."},{"key":"e_1_3_2_1_34_1","unstructured":"OpenAI. GPT-4 Technical Report. arXiv preprint arXiv:2303.08774 2023."},{"key":"e_1_3_2_1_35_1","unstructured":"Claude 2 2023 https:\/\/www.anthropic.com\/index\/claude-2"},{"key":"e_1_3_2_1_36_1","unstructured":"Wayne Xin Zhao Kun Zhou Junyi Li Tianyi Tang Xiaolei Wang Yupeng Hou Yingqian Min Beichen Zhang Junjie Zhang Zican"},{"key":"e_1_3_2_1_37_1","volume-title":"A survey of large language models. arXiv preprint arXiv:2303.18223","author":"Dong","year":"2023","unstructured":"Dong, A survey of large language models. arXiv preprint arXiv:2303.18223, 2023."},{"key":"e_1_3_2_1_38_1","unstructured":"Isaac David Liyi Zhou Kaihua Qin Dawn Song Lorenzo Cavallaro and Arthur Gervais. Do you still need a manual smart contract"},{"key":"e_1_3_2_1_39_1","unstructured":"audit? arXiv preprint arXiv:2306.12338 2023."},{"key":"e_1_3_2_1_40_1","unstructured":"Chen M Tworek J Jun H Yuan Q Pinto HP Kaplan J Edwards H Burda Y Joseph N Brockman G Ray A. Evaluating large language models trained on code. arXiv preprint arXiv:2107.03374. 2021 Jul 7."},{"key":"e_1_3_2_1_41_1","unstructured":"Chung HW Hou L Longpre S Zoph B Tay Y Fedus W Li E Wang X Dehghani M Brahma S Webson A. Scaling instruction-finetuned language models. arXiv preprint arXiv:2210.11416. 2022 Oct 20."},{"key":"e_1_3_2_1_42_1","unstructured":"Singhal K Azizi S Tu T Mahdavi SS Wei J Chung HW Scales N Tanwani A Cole-Lewis H Pfohl S Payne P. Large language models encode clinical knowledge. arXiv preprint arXiv:2212.13138. 2022 Dec 26."},{"key":"e_1_3_2_1_43_1","unstructured":"Touvron H Lavril T Izacard G Martinet X Lachaux MA Lacroix T Rozi\u00e8re B Goyal N Hambro E Azhar F Rodriguez A. Llama: Open and efficient foundation language models. arXiv preprint arXiv:2302.13971. 2023 Feb 27."},{"key":"e_1_3_2_1_44_1","unstructured":"Rozi\u00e8re B Gehring J Gloeckle F Sootla S Gat I Tan XE Adi Y Liu J Remez T Rapin J Kozhevnikov A. Code llama: Open foundation models for code. arXiv preprint arXiv:2308.12950. 2023 Aug 24."}],"event":{"name":"ICBTA 2023: 2023 6th International Conference on Blockchain Technology and Applications","location":"Xi'an China","acronym":"ICBTA 2023"},"container-title":["Proceedings of the 2023 6th International Conference on Blockchain Technology and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651655.3651658","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651655.3651658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:13:01Z","timestamp":1755972781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651655.3651658"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":44,"alternative-id":["10.1145\/3651655.3651658","10.1145\/3651655"],"URL":"https:\/\/doi.org\/10.1145\/3651655.3651658","relation":{},"subject":[],"published":{"date-parts":[[2023,12,15]]},"assertion":[{"value":"2024-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}