{"id":"https://openalex.org/W4416608147","doi":"https://doi.org/10.3389/fcomp.2025.1655469","title":"A dual perspective review on large language models and code verification","display_name":"A dual perspective review on large language models and code verification","publication_year":2025,"publication_date":"2025-11-24","ids":{"openalex":"https://openalex.org/W4416608147","doi":"https://doi.org/10.3389/fcomp.2025.1655469"},"language":"en","primary_location":{"id":"doi:10.3389/fcomp.2025.1655469","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2025.1655469","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2025.1655469/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2025.1655469/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006566093","display_name":"Greta Dolcetti","orcid":"https://orcid.org/0000-0002-2983-9251"},"institutions":[{"id":"https://openalex.org/I149461666","display_name":"Ca' Foscari University of Venice","ror":"https://ror.org/04yzxz566","country_code":"IT","type":"education","lineage":["https://openalex.org/I149461666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Greta Dolcetti","raw_affiliation_strings":["Department of Environmental Sciences, Informatics and Statistics, Ca' Foscari University of Venice, Venice, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Environmental Sciences, Informatics and Statistics, Ca' Foscari University of Venice, Venice, Italy","institution_ids":["https://openalex.org/I149461666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080101687","display_name":"Eleonora Iotti","orcid":"https://orcid.org/0000-0001-7670-2226"},"institutions":[{"id":"https://openalex.org/I124601658","display_name":"University of Parma","ror":"https://ror.org/02k7wn190","country_code":"IT","type":"education","lineage":["https://openalex.org/I124601658"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Eleonora Iotti","raw_affiliation_strings":["Department of Mathematical, Physical and Computer Sciences, University of Parma, Parma, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical, Physical and Computer Sciences, University of Parma, Parma, Italy","institution_ids":["https://openalex.org/I124601658"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080101687"],"corresponding_institution_ids":["https://openalex.org/I124601658"],"apc_list":{"value":1150,"currency":"USD","value_usd":1150},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150},"fwci":2.3568,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91932572,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"7","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.25920000672340393,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.25920000672340393,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.10859999805688858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.10490000247955322,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/functional-verification","display_name":"Functional verification","score":0.5273000001907349},{"id":"https://openalex.org/keywords/intersection","display_name":"Intersection (aeronautics)","score":0.5034000277519226},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.4973999857902527},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4875999987125397},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.44429999589920044},{"id":"https://openalex.org/keywords/software-verification","display_name":"Software verification","score":0.43709999322891235},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.4262999892234802},{"id":"https://openalex.org/keywords/verification","display_name":"Verification","score":0.38589999079704285}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7376999855041504},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5342000126838684},{"id":"https://openalex.org/C62460635","wikidata":"https://www.wikidata.org/wiki/Q5508853","display_name":"Functional verification","level":3,"score":0.5273000001907349},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.5034000277519226},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.4973999857902527},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4875999987125397},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44429999589920044},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.43709999322891235},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.4262999892234802},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.423799991607666},{"id":"https://openalex.org/C142284323","wikidata":"https://www.wikidata.org/wiki/Q7921323","display_name":"Verification","level":5,"score":0.38589999079704285},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3695000112056732},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3346000015735626},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.3343000113964081},{"id":"https://openalex.org/C3406870","wikidata":"https://www.wikidata.org/wiki/Q6044160","display_name":"Intelligent verification","level":5,"score":0.3228999972343445},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3037000000476837},{"id":"https://openalex.org/C202973057","wikidata":"https://www.wikidata.org/wiki/Q7380130","display_name":"Runtime verification","level":3,"score":0.3012999892234802},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C48002344","wikidata":"https://www.wikidata.org/wiki/Q2919644","display_name":"Verification and validation","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C66024118","wikidata":"https://www.wikidata.org/wiki/Q1122506","display_name":"Computational model","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.27880001068115234},{"id":"https://openalex.org/C179603123","wikidata":"https://www.wikidata.org/wiki/Q1941921","display_name":"Modeling language","level":3,"score":0.2621999979019165},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.25769999623298645},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.25200000405311584},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.25029999017715454}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3389/fcomp.2025.1655469","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2025.1655469","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2025.1655469/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:11abcfcc5ee44af89e542035ef76a64c","is_oa":true,"landing_page_url":"https://doaj.org/article/11abcfcc5ee44af89e542035ef76a64c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers in Computer Science, Vol 7 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3389/fcomp.2025.1655469","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2025.1655469","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2025.1655469/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322875","display_name":"Universit\u00e0 degli Studi di Parma","ror":"https://ror.org/02k7wn190"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416608147.pdf"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W4288057765","https://openalex.org/W4308641648","https://openalex.org/W4311165836","https://openalex.org/W4312436517","https://openalex.org/W4320560161","https://openalex.org/W4378942602","https://openalex.org/W4385187421","https://openalex.org/W4385884967","https://openalex.org/W4386231786","https://openalex.org/W4387298393","https://openalex.org/W4388483128","https://openalex.org/W4388638461","https://openalex.org/W4388826738","https://openalex.org/W4389161785","https://openalex.org/W4389162178","https://openalex.org/W4389215044","https://openalex.org/W4390976306","https://openalex.org/W4391377904","https://openalex.org/W4391505367","https://openalex.org/W4393029443","https://openalex.org/W4393191843","https://openalex.org/W4394745219","https://openalex.org/W4394769405","https://openalex.org/W4395029328","https://openalex.org/W4396242417","https://openalex.org/W4396820575","https://openalex.org/W4396868147","https://openalex.org/W4399872440","https://openalex.org/W4400582518","https://openalex.org/W4402264467","https://openalex.org/W4402443038","https://openalex.org/W4402457779","https://openalex.org/W4402619746","https://openalex.org/W4403182498","https://openalex.org/W4403524384","https://openalex.org/W4403536737","https://openalex.org/W4403747722","https://openalex.org/W4404060141","https://openalex.org/W4404649103","https://openalex.org/W4406308708","https://openalex.org/W4406610709","https://openalex.org/W4408047557","https://openalex.org/W6959659194"],"related_works":[],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,11,134,140,150],"Large":[3],"Language":[4],"Models":[5],"(LLMs)":[6],"have":[7],"sparked":[8],"significant":[9],"interest":[10],"their":[12],"application":[13],"to":[14,93,124],"code":[15,22,53,109,135],"verification":[16,47,51,71,81,87,98],"and":[17,49,69,77,110,117,143],"the":[18,30,42,50,59,104,128,141],"assessment":[19,106],"of":[20,32,44,52,107,131],"LLM-generated":[21,108],"safety.":[23],"This":[24],"review":[25,84],"examines":[26],"current":[27,129],"research":[28,102,149],"on":[29,38],"intersection":[31],"LLMs":[33,45,64],"with":[34,65,79],"software":[35],"verification,":[36,136],"focusing":[37],"two":[39],"main":[40],"aspects:":[41],"use":[43],"as":[46],"tools":[48],"produced":[54],"by":[55],"LLMs.":[56],"We":[57,100],"analyze":[58],"emerging":[60],"approaches":[61,95],"for":[62,114,147],"integrating":[63],"traditional":[66,97],"static":[67],"analyzers":[68],"formal":[70],"tools,":[72],"including":[73],"prompt":[74],"engineering":[75],"techniques":[76],"combinations":[78],"established":[80],"frameworks.":[82],"The":[83],"explores":[85],"various":[86],"methodologies,":[88],"from":[89],"standalone":[90],"LLM":[91,132],"applications":[92,133],"hybrid":[94],"incorporating":[96],"methods.":[99],"examine":[101],"addressing":[103],"safety":[105],"investigate":[111],"frameworks":[112],"developed":[113],"vulnerability":[115],"detection":[116],"repair.":[118],"Through":[119],"this":[120,151],"analysis,":[121],"we":[122],"aim":[123],"provide":[125],"insights":[126],"into":[127],"state":[130],"identify":[137],"key":[138],"challenges":[139],"field,":[142],"outline":[144],"important":[145],"directions":[146],"future":[148],"rapidly":[152],"evolving":[153],"domain.":[154]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-25T00:00:00"}
