What You Code Is What We Prove: Translating BLE App Logic into Formal Models with LLMs for Vulnerability Detection Authors: Biwei Yan, Yue Zhang, Minghui Xu, Runyu Pan, Jinku Li, Xiuzhen Cheng | Published: 2025-09-11 Vulnerabilities of IoT Devices形式モデルVulnerability Assessment Method 2025.09.11 2025.09.13 Literature Database