Decompiling Smart Contracts with a Large Language Model Authors: Isaac David, Liyi Zhou, Dawn Song, Arthur Gervais, Kaihua Qin | Published: 2025-06-24 デコンパイルの課題バイナリ分析Vulnerability Research 2025.06.24 2025.06.26 Literature Database
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes Authors: Pasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni | Published: 2025-06-24 バイナリ分析Detection Rate of Phishing AttacksVulnerability Research 2025.06.24 2025.06.26 Literature Database
FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk Authors: Sajal Halder, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-06-24 Prompt InjectionLarge Language ModelVulnerability Research 2025.06.24 2025.06.26 Literature Database
Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle Stages Authors: Hongli Peng, Xiaoqi Li, Wenkai Li | Published: 2025-04-21 Smart Contract AuditVulnerability ResearchWatermarking Technology 2025.04.21 2025.05.27 Literature Database
GraphAttack: Exploiting Representational Blindspots in LLM Safety Mechanisms Authors: Sinan He, An Wang | Published: 2025-04-17 AlignmentPrompt InjectionVulnerability Research 2025.04.17 2025.05.27 Literature Database