What You Code Is What We Prove: Translating BLE App Logic into Formal Models with LLMs for Vulnerability Detection Authors: Biwei Yan, Yue Zhang, Minghui Xu, Runyu Pan, Jinku Li, Xiuzhen Cheng | Published: 2025-09-11 IoTデバイスの脆弱性形式モデル脆弱性評価手法 2025.09.11 文献データベース