{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:50:58Z","timestamp":1776084658314,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Sui Foundation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714790","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T23:08:29Z","timestamp":1745363309000},"page":"1567-1576","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["SuiGPT MAD: Move AI Decompiler to Improve Transparency and Auditability on Non-Open-Source Blockchain Smart Contract"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1486-8559","authenticated-orcid":false,"given":"Eason","family":"Chen","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1089-8550","authenticated-orcid":false,"given":"Xinyi","family":"Tang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9473-6056","authenticated-orcid":false,"given":"Zimo","family":"Xiao","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5408-0761","authenticated-orcid":false,"given":"Chuangji","family":"Li","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2910-5451","authenticated-orcid":false,"given":"Shizhuo","family":"Li","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0809-1482","authenticated-orcid":false,"given":"Tingguan","family":"Wu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8017-7475","authenticated-orcid":false,"given":"Siyun","family":"Wang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3252-9975","authenticated-orcid":false,"given":"Kostas Kryptos","family":"Chalkias","sequence":"additional","affiliation":[{"name":"Mysten Labs, Palo Alto, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.018"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13054-023-04425-6"},{"key":"e_1_3_2_1_3_1","volume-title":"Stephane Sezer, et al.","author":"Blackshear Sam","year":"2019","unstructured":"Sam Blackshear, Evan Cheng, David L Dill, Victor Gao, Ben Maurer, Todd Nowacki, Alistair Pott, Shaz Qadeer, Dario Russi Rain, Stephane Sezer, et al. 2019. Move: A language with programmable resources. Libra Assoc (2019), 1."},{"key":"e_1_3_2_1_4_1","volume-title":"Language models are few-shot learners. arXiv preprint arXiv:2005.14165","author":"Brown Tom B","year":"2020","unstructured":"Tom B Brown. 2020. Language models are few-shot learners. arXiv preprint arXiv:2005.14165 (2020)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-36336-8_50"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487553.3524921"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3391195","article-title":"A survey on ethereum systems security: Vulnerabilities, attacks, and defenses","volume":"53","author":"Chen Huashan","year":"2020","unstructured":"Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. 2020. A survey on ethereum systems security: Vulnerabilities, attacks, and defenses. ACM Computing Surveys (CSUR), Vol. 53, 3 (2020), 1--43.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_8_1","volume-title":"Jared Kaplan, Harrison Edwards, Yuri Burda, Nicholas Joseph, Greg Brockman, et al.","author":"Chen Mark","year":"2021","unstructured":"Mark Chen, Jerry Tworek, Heewoo Jun, Qiming Yuan, Henrique Pond\u00e9 de Oliveira Pinto, Jared Kaplan, Harrison Edwards, Yuri Burda, Nicholas Joseph, Greg Brockman, et al. 2021. Evaluating large language models trained on code. CoRR abs\/2107.03374 (2021). arXiv preprint arXiv:2107.03374 (2021)."},{"key":"e_1_3_2_1_9_1","unstructured":"James Coker. 2024. Over $1bn in Cryptocurrency Lost to Web3 Cyber Incidents in 2024 - Infosecurity Magazine. https:\/\/www.infosecurity-magazine.com\/news\/crypto-lost-web3-cyber-incidents\/. (Accessed on 10\/07\/2024)."},{"key":"e_1_3_2_1_10_1","unstructured":"DefiLlama. 2024. Sui Protocol Rankings. https:\/\/defillama.com\/chain\/Sui. (Accessed on 10\/09\/2024)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/160940690600500107"},{"key":"e_1_3_2_1_12_1","volume-title":"Aptos Whitepaper: Safe, Scalable, and Upgradeable Web3 Infrastructure. https:\/\/aptosfoundation.org\/whitepaper. (Accessed on 10\/09\/2024).","author":"Foundation Aptos","year":"2021","unstructured":"Aptos Foundation. 2021. Aptos Whitepaper: Safe, Scalable, and Upgradeable Web3 Infrastructure. https:\/\/aptosfoundation.org\/whitepaper. (Accessed on 10\/09\/2024)."},{"key":"e_1_3_2_1_13_1","unstructured":"Edward M Gellenbeck and Curtis R Cook. 1991. An investigation of procedure and variable names as beacons during program comprehension. (1991)."},{"key":"e_1_3_2_1_14_1","volume-title":"How many interviews are enough? An experiment with data saturation and variability. Field methods","author":"Guest Greg","year":"2006","unstructured":"Greg Guest, Arwen Bunce, and Laura Johnson. 2006. How many interviews are enough? An experiment with data saturation and variability. Field methods, Vol. 18, 1 (2006), 59--82."},{"key":"e_1_3_2_1_15_1","volume-title":"Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research. Human mental workload\/Elsevier","author":"Hart SG","year":"1988","unstructured":"SG Hart. 1988. Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research. Human mental workload\/Elsevier (1988)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1037\/e577632012-009"},{"key":"e_1_3_2_1_17_1","unstructured":"IOTA. 2024. IOTA Rebased Fast Forward -- blog.iota.org. https:\/\/blog.iota.org\/iota-rebased-fast-forward. [Accessed 28-01--2025]."},{"key":"e_1_3_2_1_18_1","volume-title":"Movement: A Network of High-Throughput Fast-Finality Move-based Rollups Secured by Ethereum. https:\/\/movementlabs.xyz\/whitepaper\/movement-whitepaper_en.pdf.","author":"Labs Movement","year":"2024","unstructured":"Movement Labs. 2024. Movement: A Network of High-Throughput Fast-Finality Move-based Rollups Secured by Ethereum. https:\/\/movementlabs.xyz\/whitepaper\/movement-whitepaper_en.pdf."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.51"},{"key":"e_1_3_2_1_20_1","unstructured":"MystenLabs. 06. sui\/external-crates\/move\/crates\/move-disassembler at main \u00b7 MystenLabs\/sui. https:\/\/github.com\/MystenLabs\/sui\/tree\/main\/external-crates\/move\/crates\/move-disassembler. (Accessed on 10\/13\/2024)."},{"key":"e_1_3_2_1_21_1","unstructured":"MystenLabs. 2024a. Macro Functions - The Move Reference. https:\/\/move-book.com\/reference\/functions\/macros.html."},{"key":"e_1_3_2_1_22_1","unstructured":"MystenLabs. 2024b. Method Syntax - The Move Reference. https:\/\/move-book.com\/reference\/method-syntax.html."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICROIT.2014.6798297"},{"key":"e_1_3_2_1_24_1","volume-title":"Managerial attitudes and performance. (No Title)","author":"Porter Lyman W","year":"1968","unstructured":"Lyman W Porter and Edward E Lawler. 1968. Managerial attitudes and performance. (No Title) (1968)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2023.05.003"},{"key":"e_1_3_2_1_26_1","volume-title":"Sriparna Saha, Vinija Jain, Samrat Mondal, and Aman Chadha.","author":"Sahoo Pranab","year":"2024","unstructured":"Pranab Sahoo, Ayush Kumar Singh, Sriparna Saha, Vinija Jain, Samrat Mondal, and Aman Chadha. 2024. A systematic survey of prompt engineering in large language models: Techniques and applications. arXiv:2402.07927."},{"key":"e_1_3_2_1_27_1","unstructured":"Sander Schulhoff Michael Ilie Nishant Balepur Konstantine Kahadze Amanda Liu Chenglei Si Yinheng Li Aayush Gupta HyoJung Han Sevien Schulhoff et al. 2024. The Prompt Report: A Systematic Survey of Prompting Techniques. arXiv:2406.06608."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23008"},{"key":"e_1_3_2_1_29_1","volume-title":"LLM4Decompile: Decompiling Binary Code with Large Language Models. arXiv preprint arXiv:2403.05286","author":"Tan Hanzhuo","year":"2024","unstructured":"Hanzhuo Tan, Qi Luo, Jing Li, and Yuqun Zhang. 2024. LLM4Decompile: Decompiling Binary Code with Large Language Models. arXiv preprint arXiv:2403.05286 (2024)."},{"key":"e_1_3_2_1_30_1","unstructured":"Libra Team. 2020. The Libra Blockchain. https:\/\/diem-developers-components.netlify.app\/papers\/the-diem-blockchain\/2020-05--26.pdf."},{"key":"e_1_3_2_1_31_1","unstructured":"The MystenLabs Team. 2021. The Sui Smart Contracts Platform. https:\/\/docs.sui.io\/paper\/sui.pdf."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110891"},{"key":"e_1_3_2_1_33_1","unstructured":"Verichains. 02. verichains\/revela: Decompiler for Move smart contracts. https:\/\/github.com\/verichains\/revela. (Accessed on 10\/07\/2024)."},{"key":"e_1_3_2_1_34_1","unstructured":"Sui Vision. 2024a. Sui Coin List. https:\/\/suivision.xyz\/coins."},{"key":"e_1_3_2_1_35_1","unstructured":"Sui Vision. 2024b. Sui NFT Dashboard. https:\/\/suivision.xyz\/nfts. (Accessed on 10\/09\/2024)."},{"key":"e_1_3_2_1_36_1","volume-title":"Work and motivation. John Willey & Sons","author":"Vroom Victor H","year":"1964","unstructured":"Victor H Vroom. 1964. Work and motivation. John Willey & Sons (1964)."},{"key":"e_1_3_2_1_37_1","volume-title":"Generalizing from a few examples: A survey on few-shot learning. ACM computing surveys (csur)","author":"Wang Yaqing","year":"2020","unstructured":"Yaqing Wang, Quanming Yao, James T Kwok, and Lionel M Ni. 2020. Generalizing from a few examples: A survey on few-shot learning. ACM computing surveys (csur), Vol. 53, 3 (2020), 1--34."},{"key":"e_1_3_2_1_38_1","volume-title":"Refining decompiled c code with large language models. arXiv preprint arXiv:2310.06530","author":"Wong Wai Kin","year":"2023","unstructured":"Wai Kin Wong, Huaijin Wang, Zongjie Li, Zhibo Liu, Shuai Wang, Qiyi Tang, Sen Nie, and Shi Wu. 2023. Refining decompiled c code with large language models. arXiv preprint arXiv:2310.06530 (2023)."},{"key":"e_1_3_2_1_39_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, Vol. 151, 2014 (2014), 1--32."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1093\/jfr\/fjaa010"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"e_1_3_2_1_42_1","volume-title":"Xuan-Bach Dinh Le, Xin Xia, Yang Feng, Zhenyu Chen, and Baowen Xu.","author":"Zou Weiqin","year":"2019","unstructured":"Weiqin Zou, David Lo, Pavneet Singh Kochhar, Xuan-Bach Dinh Le, Xin Xia, Yang Feng, Zhenyu Chen, and Baowen Xu. 2019. Smart contract development: Challenges and opportunities. IEEE transactions on software engineering, Vol. 47, 10 (2019), 2084--2106."}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:41Z","timestamp":1750295921000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":42,"alternative-id":["10.1145\/3696410.3714790","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714790","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}