LLM-based program analysis for source codes, abstract syntax trees and webassembly instructions
The advancement of Web3.0 technology has brought about a urgent need for ensuring the safety and reliability of the software systems. Program analysis, a crucial aspect of software security research need a unified solution for various cross-language program. Moreover, the previous studies regard the...
Gespeichert in:
| Veröffentlicht in: | Cluster computing Jg. 28; H. 14; S. 892 |
|---|---|
| Hauptverfasser: | , , , , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York
Springer US
01.11.2025
Springer Nature B.V |
| Schlagworte: | |
| ISSN: | 1386-7857, 1573-7543 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The advancement of Web3.0 technology has brought about a urgent need for ensuring the safety and reliability of the software systems. Program analysis, a crucial aspect of software security research need a unified solution for various cross-language program. Moreover, the previous studies regard the necessity of capturing structured features from the ASTs, commonly holding a conception that plain text and compiled binary instructions are challenging to represent and identify. This paper proposes three methods for extracting structural information to demonstrate that the underlying principles of source code and instructions align with those of an abstract syntax tree. These methods include (1) embedding program instruction files directly into natural language, (2) embedding formatted source code into natural language, and (3) embedding misformatted, non-compilable source code into natural language. We train large-scale language models (LLMs) to identify defect and non-defect of WebAssembly. Experiment results demonstrate that program instruction analysis surpasses traditional techniques, achieving state-of-the-art accuracy exceeding 98.1%. Our study also suggests a practical approach of plain text embedding using a 7.65 billion LLM. Interestingly, misformatted source codes are readable to humans but un-compilable, and the accuracy remains above 98.63%. This paper not only introduces novel instruction and plain text embedding approach for future program security analysis, but also provides new insights for subsequent research about the three program analysis forms of plain text, ASTs, and instructions. |
|---|---|
| AbstractList | The advancement of Web3.0 technology has brought about a urgent need for ensuring the safety and reliability of the software systems. Program analysis, a crucial aspect of software security research need a unified solution for various cross-language program. Moreover, the previous studies regard the necessity of capturing structured features from the ASTs, commonly holding a conception that plain text and compiled binary instructions are challenging to represent and identify. This paper proposes three methods for extracting structural information to demonstrate that the underlying principles of source code and instructions align with those of an abstract syntax tree. These methods include (1) embedding program instruction files directly into natural language, (2) embedding formatted source code into natural language, and (3) embedding misformatted, non-compilable source code into natural language. We train large-scale language models (LLMs) to identify defect and non-defect of WebAssembly. Experiment results demonstrate that program instruction analysis surpasses traditional techniques, achieving state-of-the-art accuracy exceeding 98.1%. Our study also suggests a practical approach of plain text embedding using a 7.65 billion LLM. Interestingly, misformatted source codes are readable to humans but un-compilable, and the accuracy remains above 98.63%. This paper not only introduces novel instruction and plain text embedding approach for future program security analysis, but also provides new insights for subsequent research about the three program analysis forms of plain text, ASTs, and instructions. The advancement of Web3.0 technology has brought about a urgent need for ensuring the safety and reliability of the software systems. Program analysis, a crucial aspect of software security research need a unified solution for various cross-language program. Moreover, the previous studies regard the necessity of capturing structured features from the ASTs, commonly holding a conception that plain text and compiled binary instructions are challenging to represent and identify. This paper proposes three methods for extracting structural information to demonstrate that the underlying principles of source code and instructions align with those of an abstract syntax tree. These methods include (1) embedding program instruction files directly into natural language, (2) embedding formatted source code into natural language, and (3) embedding misformatted, non-compilable source code into natural language. We train large-scale language models (LLMs) to identify defect and non-defect of WebAssembly. Experiment results demonstrate that program instruction analysis surpasses traditional techniques, achieving state-of-the-art accuracy exceeding 98.1%. Our study also suggests a practical approach of plain text embedding using a 7.65 billion LLM. Interestingly, misformatted source codes are readable to humans but un-compilable, and the accuracy remains above 98.63%. This paper not only introduces novel instruction and plain text embedding approach for future program security analysis, but also provides new insights for subsequent research about the three program analysis forms of plain text, ASTs, and instructions. |
| ArticleNumber | 892 |
| Author | Qiu, Yao Lei, Hang Cheng, Hongyuan Zhong, Qi Deng, Liangjun Yang, Shunkun Zhou, Liming Chen, Jingxue |
| Author_xml | – sequence: 1 givenname: Liangjun orcidid: 0009-0005-3771-7114 surname: Deng fullname: Deng, Liangjun organization: School of Information and Software Engineering, University of Electronic Science and Technology of China – sequence: 2 givenname: Qi surname: Zhong fullname: Zhong, Qi organization: Faculty of Data Science, City University of Macau – sequence: 3 givenname: Yao surname: Qiu fullname: Qiu, Yao organization: Ningbo Polytechnic College – sequence: 4 givenname: Jingxue surname: Chen fullname: Chen, Jingxue organization: School of Mathematical and Physical Sciences, University of Technology Sydney – sequence: 5 givenname: Hang surname: Lei fullname: Lei, Hang organization: School of Information and Software Engineering, University of Electronic Science and Technology of China – sequence: 6 givenname: Shunkun surname: Yang fullname: Yang, Shunkun organization: Kash Institute of Electronics and Information Industry of China – sequence: 7 givenname: Liming surname: Zhou fullname: Zhou, Liming organization: School of Information and Software Engineering, University of Electronic Science and Technology of China – sequence: 8 givenname: Hongyuan surname: Cheng fullname: Cheng, Hongyuan email: chenghongyuan@lyu.edu.cn organization: School of Information Science and Engineering, Linyi University |
| BookMark | eNp9kE9LAzEQxYNUsK1-AU8Br0aT7GaTHKX4D1a86Dkk2WzZ0u7WTErdb290BW8ehhmY9x4zvwWa9UMfELpk9IZRKm-BUaEqQrkgVAghyfEEzZmQBZGiLGZ5LvJaKiHP0AJgQynVkus5MnX9QpyF0OB9HNbR7rDt7XaEDnA7RAzDIfqA_dAEuMbWQYrWJwxjn-wnTjEEyIYGH0MOgbBz2xF3fVYdfOqGHs7RaWu3EC5--xK9P9y_rZ5I_fr4vLqrieeSJ8Kco4p7W5a0ZIUWwblWC8WqqmqVbB1vlLOW21C6hgrO20orqr1loXGysqxYoqspN3_xcQiQzCZfnj8BU3AhdC6ls4pPKh8HgBhas4_dzsbRMGq-QZoJpMkgzQ9Ic8ymYjJBFvfrEP-i_3F9ATtQehU |
| Cites_doi | 10.3390/electronics12234749 10.1145/3442381.3450138 10.1145/3297858.3304068 10.1609/aaai.v30i1.10139 10.1109/ICCVE45908.2019.8965092 10.1109/TITS.2019.2926042 10.1016/j.aiopen.2023.08.012 10.1109/ICSE.2019.00086 10.1007/s10489-023-05171-6 10.1145/2970276.2970326 10.1109/JIOT.2024.3393122 10.1016/j.compag.2018.02.016 10.48550/ARXIV.2204.06745 10.18653/v1/2020.findings-emnlp.139 10.1109/MWC.2018.1700364 10.1145/3597503.3639187 10.1007/s10489-021-02894-2 10.1016/j.knosys.2024.111909 10.18653/v1/P16-2022 10.1109/ACCESS.2019.2900462 10.24963/ijcai.2017/423 10.1109/ACCESS.2024.3389497 10.1109/JSAC.2023.3310094 10.1109/TCC.2024.3372598 10.1016/j.cose.2022.102914 10.1145/2884781.2884877 10.1007/978-1-4842-7496-5 10.1145/3679013 10.1109/JSYST.2023.3264773 10.1016/j.jss.2007.03.004 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025. |
| DBID | AAYXX CITATION JQ2 |
| DOI | 10.1007/s10586-025-05557-w |
| DatabaseName | CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1573-7543 |
| ExternalDocumentID | 10_1007_s10586_025_05557_w |
| GrantInformation_xml | – fundername: Research on digital twin collaboration technology for dynamic assembly of human-computer collaboration grantid: 2024Z296 |
| GroupedDBID | -~C .86 .DC .VR 06D 0R~ 0VY 1N0 203 29B 2J2 2JN 2JY 2KG 2LR 2~H 30V 4.4 406 408 409 40D 40E 5GY 5VS 67Z 6NX 78A 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAJBT AAJKR AANZL AAPKM AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN ABAKF ABBBX ABBRH ABBXA ABDBE ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABRTQ ABSXP ABTEG ABTHY ABTKH ABTMW ABWNU ABXPI ACAOD ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADKFA ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEFQL AEGAL AEGNC AEJHL AEJRE AEMSY AEOHA AEPYU AETLH AEVLU AEXYK AFDZB AFLOW AFOHR AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHPBZ AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ ASPBG ATHPR AVWKF AXYYD AYFIA AYJHY AZFZN B-. BA0 BGNMA BSONS CS3 CSCUP DDRTE DL5 DNIVK DPUIP EBLON EBS EIOEI ESBYG FEDTE FERAY FFXSO FIGPU FNLPD FRRFC FWDCC GGCAI GGRSB GJIRD GNWQR GQ7 GQ8 GXS HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF I09 IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV LAK LLZTM M4Y MA- NB0 NPVJJ NQJWS NU0 O93 O9J OAM P9O PF0 PT4 PT5 QOS R89 R9I RNS ROL RPX RSV S16 S1Z S27 S3B SAP SCO SDH SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 ZMTXR ~A9 -Y2 1SB 2P1 2VQ AAIAL AARHV AAYTO AAYXX ABQSL ABULA ACBXY ADHKG AEBTG AEKMD AFFHD AFGCZ AFKRA AGGDS AGQPQ AHSBF AJBLW ARAPS BDATZ BENPR BGLVJ CAG CCPQU CITATION COF EJD FINBP FSGXE H13 HCIFZ HZ~ IHE K7- N2Q O9- OVD PHGZM PHGZT PQGLB RNI RZC RZE RZK TEORI JQ2 |
| ID | FETCH-LOGICAL-c272t-1bb082ca44041395ebbf9581666f87fb2d8baa2ae4bd0522f69809ca1edb76a13 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001586153500035&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1386-7857 |
| IngestDate | Sat Nov 29 03:45:57 EST 2025 Thu Nov 20 00:51:35 EST 2025 Fri Nov 28 01:10:43 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 14 |
| Keywords | Webassembly Group key agreement Program analysis Blockchain |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c272t-1bb082ca44041395ebbf9581666f87fb2d8baa2ae4bd0522f69809ca1edb76a13 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0009-0005-3771-7114 |
| PQID | 3255925589 |
| PQPubID | 2043865 |
| ParticipantIDs | proquest_journals_3255925589 crossref_primary_10_1007_s10586_025_05557_w springer_journals_10_1007_s10586_025_05557_w |
| PublicationCentury | 2000 |
| PublicationDate | 2025-11-01 |
| PublicationDateYYYYMMDD | 2025-11-01 |
| PublicationDate_xml | – month: 11 year: 2025 text: 2025-11-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | The Journal of Networks, Software Tools and Applications |
| PublicationTitle | Cluster computing |
| PublicationTitleAbbrev | Cluster Comput |
| PublicationYear | 2025 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | P Koopman (5557_CR8) 2017; 9 5557_CR9 5557_CR30 5557_CR31 J Guo (5557_CR10) 2019; 21 5557_CR32 5557_CR33 5557_CR34 A Kamilaris (5557_CR1) 2018; 147 5557_CR13 5557_CR35 5557_CR14 5557_CR36 5557_CR3 G Frantzeskou (5557_CR16) 2008; 81 AO Bang (5557_CR2) 2022; 123 G Huang (5557_CR15) 2019; 7 5557_CR37 J Chen (5557_CR4) 2024; 56 5557_CR17 5557_CR39 H Cheng (5557_CR6) 2023; 17 5557_CR18 Q Luo (5557_CR12) 2018; 25 5557_CR19 5557_CR40 J Chen (5557_CR11) 2024; 39 5557_CR41 5557_CR20 5557_CR42 5557_CR21 W Hua (5557_CR25) 2022; 52 5557_CR43 5557_CR22 5557_CR44 5557_CR23 5557_CR45 5557_CR24 5557_CR46 5557_CR47 W Ke (5557_CR5) 2024; 296 D Zheng (5557_CR7) 2024; 54 S Black (5557_CR38) 2022 5557_CR26 5557_CR48 5557_CR27 5557_CR28 5557_CR29 |
| References_xml | – ident: 5557_CR3 doi: 10.3390/electronics12234749 – ident: 5557_CR35 doi: 10.1145/3442381.3450138 – ident: 5557_CR36 doi: 10.1145/3297858.3304068 – ident: 5557_CR22 doi: 10.1609/aaai.v30i1.10139 – ident: 5557_CR13 doi: 10.1109/ICCVE45908.2019.8965092 – ident: 5557_CR24 – volume: 21 start-page: 3135 issue: 8 year: 2019 ident: 5557_CR10 publication-title: IEEE Trans. Intell. Transp. Syst. doi: 10.1109/TITS.2019.2926042 – ident: 5557_CR47 – ident: 5557_CR26 doi: 10.1016/j.aiopen.2023.08.012 – ident: 5557_CR28 – ident: 5557_CR48 doi: 10.1109/ICSE.2019.00086 – volume: 54 start-page: 428 issue: 1 year: 2024 ident: 5557_CR7 publication-title: Appl. Intell. doi: 10.1007/s10489-023-05171-6 – ident: 5557_CR45 – ident: 5557_CR43 – ident: 5557_CR17 doi: 10.1145/2970276.2970326 – ident: 5557_CR14 doi: 10.1109/JIOT.2024.3393122 – ident: 5557_CR40 – volume: 147 start-page: 70 year: 2018 ident: 5557_CR1 publication-title: Comput. Electron. Agric. doi: 10.1016/j.compag.2018.02.016 – ident: 5557_CR34 – volume: 39 start-page: 100593 year: 2024 ident: 5557_CR11 publication-title: J. Industrial Inform. Integr. – year: 2022 ident: 5557_CR38 publication-title: ARXIV doi: 10.48550/ARXIV.2204.06745 – ident: 5557_CR20 doi: 10.18653/v1/2020.findings-emnlp.139 – volume: 25 start-page: 113 issue: 6 year: 2018 ident: 5557_CR12 publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.2018.1700364 – ident: 5557_CR29 doi: 10.1145/3597503.3639187 – ident: 5557_CR46 – volume: 52 start-page: 8895 issue: 8 year: 2022 ident: 5557_CR25 publication-title: Appl. Intell. doi: 10.1007/s10489-021-02894-2 – ident: 5557_CR44 – volume: 296 start-page: 111909 year: 2024 ident: 5557_CR5 publication-title: Knowl. Based Syst. doi: 10.1016/j.knosys.2024.111909 – ident: 5557_CR42 – ident: 5557_CR23 – ident: 5557_CR21 doi: 10.18653/v1/P16-2022 – volume: 7 start-page: 28291 year: 2019 ident: 5557_CR15 publication-title: IEEE Access. doi: 10.1109/ACCESS.2019.2900462 – ident: 5557_CR18 doi: 10.24963/ijcai.2017/423 – ident: 5557_CR27 doi: 10.1109/ACCESS.2024.3389497 – ident: 5557_CR30 doi: 10.1109/JSAC.2023.3310094 – volume: 9 start-page: 90 issue: 1 year: 2017 ident: 5557_CR8 publication-title: IEEE Intell. Transp. Syst. Mag. – ident: 5557_CR37 – ident: 5557_CR41 – ident: 5557_CR9 doi: 10.1109/TCC.2024.3372598 – volume: 123 start-page: 102914 year: 2022 ident: 5557_CR2 publication-title: Computers Secur. doi: 10.1016/j.cose.2022.102914 – ident: 5557_CR19 doi: 10.1145/2884781.2884877 – ident: 5557_CR39 – ident: 5557_CR31 – ident: 5557_CR32 doi: 10.1007/978-1-4842-7496-5 – ident: 5557_CR33 – volume: 56 start-page: 1 issue: 12 year: 2024 ident: 5557_CR4 publication-title: ACM Comput. Surveys doi: 10.1145/3679013 – volume: 17 start-page: 4922 issue: 3 year: 2023 ident: 5557_CR6 publication-title: IEEE Syst. J. doi: 10.1109/JSYST.2023.3264773 – volume: 81 start-page: 447 issue: 3 year: 2008 ident: 5557_CR16 publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2007.03.004 |
| SSID | ssj0009729 |
| Score | 2.366196 |
| Snippet | The advancement of Web3.0 technology has brought about a urgent need for ensuring the safety and reliability of the software systems. Program analysis, a... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 892 |
| SubjectTerms | Accuracy Codes Computer Communication Networks Computer Science Deep learning Defects Edge computing Embedding Internet of Things Large language models Medical research Natural language Natural language processing Neural networks Operating Systems Processor Architectures Program verification (computers) Programming languages Security Semantics Software engineering Software reliability Source code Syntax |
| Title | LLM-based program analysis for source codes, abstract syntax trees and webassembly instructions |
| URI | https://link.springer.com/article/10.1007/s10586-025-05557-w https://www.proquest.com/docview/3255925589 |
| Volume | 28 |
| WOSCitedRecordID | wos001586153500035&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1573-7543 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009729 issn: 1386-7857 databaseCode: RSV dateStart: 19980101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwED5BYWChPEWhIA9s1FLzqp0RISqGUiEeVTfLdhypEgREIkr_PWfXUQDBAEOm2Fb0ne374vN9B3AqYx5Jq_LJtOzTOIsyKk0UURtC00aaPHRKTJMRG4_5dJre-KSwsr7tXock3U79Kdkt4fbCbEKtSBWj81VYQ3fHbcGG27tJI7XLXG2yIMLWjCfMp8r8PMZXd9RwzG9hUedthu3_fecWbHp2Sc6X02EbVkyxA-26cgPxC3kXxGh0Ta0Dy4i_oEWkVychyGLJ8kif2Hz3skeksuchuiLloqjkO7GB7BI7ZAT3YCTf5kk9Lsis0aIt9-BheHl_cUV9qQWq0RgVDZRCLqClVQtETpgYpfI0cTHFnLNchRlXUobSxCrrI2XLB4h7qmVgMsUGMoj2oVU8F-YASBAoaUUMtQ5VzFMcGQGxRAm9cZBm_Q6c1YiLl6Wihmi0ky12ArETDjsx70C3Norwq6sUkf0PwoenHejVRmhe_z7a4d-aH8FGaO3oUg-70EIUzTGs67dqVr6euFn3AdqX1AY |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60CnqxPrFaNQdvGui-utmjiKXitojW0lvIa6Ggq7iLtf_eJM2yKnrQw542GZaZJPNtZuYbgFMWkoAZls9YsA4OZSAxU0GATQhNKKYy3zIxjdN4OCSTSXLrisKKKtu9Cknak_pTsVtETMJshA1JVYxny7ASao9lGPPv7sc11W5se5N5gR4dkyh2pTI_y_jqjmqM-S0sar1Nr_m_79yEDYcu0cViOWzBksq3oVl1bkBuI-8ATdMBNg5MIpeghZhjJ0EaxaLFlT4y9e7FOWLc3IeIEhXzvGTvyASyCz1BIn0Ga_CtnvjjHE1rLtpiFx56V6PLPnatFrDQxiixx7nGAoIZtkCNCSPFeZZENqaYkTjjviScMZ-pkMuOhmxZNyGdRDBPSR53mRfsQSN_ztU-IM_jzJAYCuHzkCRaslaIAUraG3uJ7LTgrNI4fVkwatCaO9nojmrdUas7OmtBuzIKdburoIH5D9IPSVpwXhmhfv27tIO_DT-Btf5okNL0enhzCOu-saktQ2xDQ2tUHcGqeCunxeuxXYEf1JbW6g |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB60inixPrFadQ_e7GLzajZHUYtiLQW19LbsK1DQWEyw9t-7kyakih7EQ07ZHcLMbubbnZlvAE6FzzyBLJ-hEm3qa09TYTyPYghNGWFiN2diGvbCfp-NRtFgoYo_z3YvQ5LzmgZkaUqy84mOzxcK3wKGybMBRcKqkE6XYcXHRHo8rz8MK9rdMO9T5nh2dMiCsCib-VnGV9dU4c1vIdLc83Tr___mTdgoUCe5mC-TLVgyyTbUy44OpNjgO8B7vXuKjk2TInGLiIK1hFh0S-ZX_QTr4NMWERLvSVRG0lmSiQ-CAe7UTtDE_pstKDcv8nlGxhVHbboLT93rx8sbWrRgoMoaKaOOlBYjKIEsghYrBkbKOAryWGPMwli6mkkhXGF8qdsWysWdiLUjJRyjZdgRjrcHteQ1MftAHEcKJDdUypU-i6xkqxAEUNZLO5FuN-Cs1D6fzJk2eMWpjLrjVnc81x2fNqBZGogXuy7lHp6P7MOiBrRKg1Svf5d28LfhJ7A2uOry3m3_7hDWXTRpXp3YhJpVqDmCVfWejdO343wxfgL99N_O |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=LLM-based+program+analysis+for+source+codes%2C+abstract+syntax+trees+and+webassembly+instructions&rft.jtitle=Cluster+computing&rft.au=Deng%2C+Liangjun&rft.au=Zhong%2C+Qi&rft.au=Qiu%2C+Yao&rft.au=Chen%2C+Jingxue&rft.date=2025-11-01&rft.pub=Springer+US&rft.issn=1386-7857&rft.eissn=1573-7543&rft.volume=28&rft.issue=14&rft_id=info:doi/10.1007%2Fs10586-025-05557-w&rft.externalDocID=10_1007_s10586_025_05557_w |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1386-7857&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1386-7857&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1386-7857&client=summon |