{"id":"https://openalex.org/W4403537098","doi":"https://doi.org/10.1145/3691620.3695349","title":"ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts","display_name":"ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts","publication_year":2024,"publication_date":"2024-10-18","ids":{"openalex":"https://openalex.org/W4403537098","doi":"https://doi.org/10.1145/3691620.3695349"},"language":"en","primary_location":{"id":"doi:10.1145/3691620.3695349","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3691620.3695349","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2409.09661","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060890291","display_name":"Che Wang","orcid":"https://orcid.org/0009-0007-7689-5698"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Che Wang","raw_affiliation_strings":["School of Computer Science, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026151248","display_name":"Jiashuo Zhang","orcid":"https://orcid.org/0000-0002-8140-9208"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiashuo Zhang","raw_affiliation_strings":["School of Computer Science, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089030314","display_name":"Jianbo Gao","orcid":"https://orcid.org/0000-0002-6760-5552"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbo Gao","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075114061","display_name":"L. Xia","orcid":"https://orcid.org/0009-0001-1374-2519"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Libin Xia","raw_affiliation_strings":["School of Computer Science, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005225068","display_name":"Zhi Guan","orcid":"https://orcid.org/0000-0002-6144-4815"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Guan","raw_affiliation_strings":["National Engineering Research Center For Software Engineering, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center For Software Engineering, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107170492","display_name":"Zhong Chen","orcid":"https://orcid.org/0000-0002-5785-2912"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Chen","raw_affiliation_strings":["School of Computer Science, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5060890291"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":9.9247,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.98054748,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2350","last_page":"2353"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11995","display_name":"FinTech, Crowdfunding, Digital Finance","score":0.9703999757766724,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13643","display_name":"Artificial Intelligence in Law","score":0.939300000667572,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6722293496131897},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5153734087944031},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4996654987335205},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.46693935990333557},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.06554493308067322}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6722293496131897},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5153734087944031},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4996654987335205},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.46693935990333557},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.06554493308067322},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0},{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3691620.3695349","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3691620.3695349","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2409.09661","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2409.09661","pdf_url":"https://arxiv.org/pdf/2409.09661","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2409.09661","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2409.09661","pdf_url":"https://arxiv.org/pdf/2409.09661","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3616018988","display_name":null,"funder_award_id":"62202011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4449585094","display_name":null,"funder_award_id":"62172010","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4403537098.pdf","grobid_xml":"https://content.openalex.org/works/W4403537098.grobid-xml"},"referenced_works_count":6,"referenced_works":["https://openalex.org/W3011594683","https://openalex.org/W4236122830","https://openalex.org/W4353004773","https://openalex.org/W4384347367","https://openalex.org/W4385571045","https://openalex.org/W4389161628"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2062873522","https://openalex.org/W2947584067","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2789975780"],"abstract_inverted_index":{"Smart":[0],"contracts":[1],"are":[2,136],"susceptible":[3],"to":[4,25,55,60,94,104,112],"being":[5],"exploited":[6],"by":[7,132],"attackers,":[8],"especially":[9],"when":[10],"facing":[11],"real-world":[12,57,81],"vulnerabilities.":[13,122],"To":[14,67],"mitigate":[15],"this":[16,69],"risk,":[17],"developers":[18,44],"often":[19],"rely":[20],"on":[21,119],"third-party":[22],"audit":[23],"services":[24],"identify":[26],"potential":[27],"vulnerabilities":[28,36,58],"before":[29],"project":[30],"deployment.":[31],"Nevertheless,":[32],"repairing":[33],"the":[34,91,97,114,129,141],"identified":[35],"is":[37,87,154],"still":[38],"complex":[39],"and":[40],"laborintensive,":[41],"particularly":[42],"for":[43,80],"lacking":[45],"security":[46],"expertise.":[47],"Moreover,":[48],"existing":[49],"pattern-based":[50],"repair":[51],"tools":[52],"mostly":[53],"fail":[54],"address":[56],"due":[59],"their":[61],"lack":[62],"of":[63,90,152],"high-level":[64],"semantic":[65],"understanding.":[66],"fill":[68],"gap,":[70],"we":[71,107],"propose":[72],"ContractTinker,":[73,133],"a":[74],"Large":[75],"Language":[76],"Models":[77],"(LLMs)-empowered":[78],"tool":[79],"vulnerability":[82],"repair.":[83],"The":[84,123],"key":[85],"insight":[86],"our":[88],"adoption":[89],"Chain-of-Thought":[92],"approach":[93],"break":[95],"down":[96],"entire":[98],"generation":[99],"task":[100],"into":[101],"subtasks.":[102],"Additionally,":[103],"reduce":[105],"hallucination,":[106],"integrate":[108],"program":[109],"static":[110],"analysis":[111],"guide":[113],"LLM.":[115],"We":[116],"evaluate":[117],"ContractTinker":[118,153],"48":[120],"high-risk":[121],"experimental":[124],"results":[125],"show":[126],"that":[127,139],"among":[128],"patches":[130,138],"generated":[131],"23":[134],"(48%)":[135],"valid":[137],"fix":[140],"vulnerabilities,":[142],"while":[143],"10":[144],"(21%)":[145],"require":[146],"only":[147],"minor":[148],"modifications.":[149],"A":[150],"video":[151],"available":[155],"at":[156],"https://youtu.be/HWFVi-YHcPE.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":12}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
