{"id":"https://openalex.org/W4406892594","doi":"https://doi.org/10.1109/csnet64211.2024.10851734","title":"Advanced Smart Contract Vulnerability Detection Using Large Language Models","display_name":"Advanced Smart Contract Vulnerability Detection Using Large Language Models","publication_year":2024,"publication_date":"2024-12-04","ids":{"openalex":"https://openalex.org/W4406892594","doi":"https://doi.org/10.1109/csnet64211.2024.10851734"},"language":"en","primary_location":{"id":"doi:10.1109/csnet64211.2024.10851734","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851734","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074282378","display_name":"Fatemeh Erfan","orcid":null},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Fatemeh Erfan","raw_affiliation_strings":["Polytechnique Montr&#x00E9;al,Department of Computer and Software Engineering,Montr&#x00E9;al,QC,Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Polytechnique Montr&#x00E9;al,Department of Computer and Software Engineering,Montr&#x00E9;al,QC,Canada","institution_ids":["https://openalex.org/I45683168"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078747160","display_name":"Mohammad Yahyatabar","orcid":"https://orcid.org/0000-0002-8808-6990"},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Yahyatabar","raw_affiliation_strings":["Polytechnique Montr&#x00E9;al,Department of Computer and Software Engineering,Montr&#x00E9;al,QC,Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Polytechnique Montr&#x00E9;al,Department of Computer and Software Engineering,Montr&#x00E9;al,QC,Canada","institution_ids":["https://openalex.org/I45683168"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010894972","display_name":"Martine Bella\u00efche","orcid":"https://orcid.org/0000-0001-9530-7643"},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Martine Bellaiche","raw_affiliation_strings":["Polytechnique Montr&#x00E9;al,Department of Computer and Software Engineering,Montr&#x00E9;al,QC,Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Polytechnique Montr&#x00E9;al,Department of Computer and Software Engineering,Montr&#x00E9;al,QC,Canada","institution_ids":["https://openalex.org/I45683168"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055415812","display_name":"Talal Halabi","orcid":"https://orcid.org/0000-0002-1922-5803"},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Talal Halabi","raw_affiliation_strings":["Universit&#x00E9; Laval,Department of Computer Science,Qu&#x00E9;bec,QC,Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; Laval,Department of Computer Science,Qu&#x00E9;bec,QC,Canada","institution_ids":["https://openalex.org/I43406934"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074282378"],"corresponding_institution_ids":["https://openalex.org/I45683168"],"apc_list":null,"apc_paid":null,"fwci":6.1794,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96665582,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"289","last_page":"296"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13643","display_name":"Artificial Intelligence in Law","score":0.9239000082015991,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13643","display_name":"Artificial Intelligence in Law","score":0.9239000082015991,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6716790199279785},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5978990793228149},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40230175852775574}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6716790199279785},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5978990793228149},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40230175852775574}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csnet64211.2024.10851734","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851734","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},{"id":"pmh:oai:publications.polymtl.ca:62710","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401013","display_name":"PolyPublie (\u00c9cole Polytechnique de Montr\u00e9al)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45683168","host_organization_name":"Polytechnique Montr\u00e9al","host_organization_lineage":["https://openalex.org/I45683168"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"With":[0],"the":[1,9,52,94,97,109,127,152,162,165,194],"rapid":[2],"expansion":[3],"of":[4,11,83,96,164,196],"using":[5,144,154],"smart":[6,24],"contracts,":[7,72],"protecting":[8],"security":[10,168],"these":[12],"contracts":[13,25],"has":[14],"become":[15],"crucial.":[16],"Existing":[17],"analysis":[18],"tools":[19,181],"for":[20,80,111,126],"detecting":[21,200],"vulnerabilities":[22,59],"in":[23,33,44,199],"are":[26,188],"unreliable":[27],"as":[28],"they":[29],"often":[30],"fall":[31],"short":[32],"accuracy,":[34],"primarily":[35],"due":[36,85],"to":[37,57,61,86,107,120,160],"their":[38],"low":[39,197],"recall":[40,186,198],"rates-a":[41],"significant":[42],"challenge":[43,195],"this":[45,48],"field.":[46],"In":[47],"work,":[49],"we":[50,102,150],"utilize":[51,115],"open-source":[53],"SolidiFi":[54],"benchmark":[55],"dataset":[56,110],"detect":[58],"related":[60],"Integer":[62],"overflow/underflow":[63],"(IoU),":[64],"reentrancy":[65],"(RE),":[66],"and":[67,74,89,136,146,157,170,182,192,203],"timestamp":[68],"dependency":[69],"(TD).":[70],"These":[71],"verified":[73],"available":[75],"on":[76],"Etherscan,":[77],"proved":[78],"unsuitable":[79],"direct":[81],"application":[82],"LLMs":[84],"comments,":[87],"functions,":[88],"variables":[90],"that":[91,176],"might":[92,133],"reveal":[93],"nature":[95],"vulnerabilities.":[98],"To":[99],"address":[100],"this,":[101],"performed":[103],"several":[104],"preprocessing":[105],"steps":[106],"prepare":[108],"further":[112],"research.":[113],"We":[114,140],"a":[116],"large":[117],"language":[118],"model":[119],"identify":[121],"vulnerable":[122],"code,":[123],"provide":[124],"reasoning":[125],"vulnerabilities,":[128,205],"explain":[129],"how":[130],"an":[131],"attacker":[132],"exploit":[134],"them,":[135],"propose":[137],"fixed":[138],"code.":[139],"design":[141],"our":[142,177,185],"prompts":[143],"chain-of-thought":[145],"expert":[147,158],"patterns.":[148],"Finally,":[149],"evaluate":[151],"results":[153],"various":[155],"metrics":[156],"reviewers":[159],"assess":[161],"correctness":[163],"reasoning,":[166],"potential":[167],"risks,":[169],"code":[171],"fixes.":[172],"Our":[173],"experiments":[174],"demonstrate":[175],"approach":[178],"outperforms":[179],"existing":[180],"methods.":[183],"Notably,":[184],"rates":[187],"significantly":[189],"high-93.5%,":[190],"95.4%,":[191],"93.8%-addressing":[193],"IoU,":[201],"RE,":[202],"TD":[204],"respectively.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-11T08:15:01.531666","created_date":"2025-10-10T00:00:00"}
