{"id":"https://openalex.org/W4389393572","doi":"https://doi.org/10.1007/s10664-023-10415-7","title":"APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities","display_name":"APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities","publication_year":2023,"publication_date":"2023-12-06","ids":{"openalex":"https://openalex.org/W4389393572","doi":"https://doi.org/10.1007/s10664-023-10415-7"},"language":"en","primary_location":{"id":"doi:10.1007/s10664-023-10415-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-023-10415-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-023-10415-7.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10664-023-10415-7.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026800191","display_name":"Quang-Cuong Bui","orcid":"https://orcid.org/0000-0001-6072-9213"},"institutions":[{"id":"https://openalex.org/I159176309","display_name":"Universit\u00e4t Hamburg","ror":"https://ror.org/00g30e956","country_code":"DE","type":"education","lineage":["https://openalex.org/I159176309"]},{"id":"https://openalex.org/I884043246","display_name":"Hamburg University of Technology","ror":"https://ror.org/04bs1pb34","country_code":"DE","type":"education","lineage":["https://openalex.org/I884043246"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Quang-Cuong Bui","raw_affiliation_strings":["Hamburg University of Technology, Hamburg, Germany"],"raw_orcid":"https://orcid.org/0000-0001-6072-9213","affiliations":[{"raw_affiliation_string":"Hamburg University of Technology, Hamburg, Germany","institution_ids":["https://openalex.org/I159176309","https://openalex.org/I884043246"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057850580","display_name":"Ranindya Paramitha","orcid":"https://orcid.org/0000-0002-6682-4243"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Ranindya Paramitha","raw_affiliation_strings":["University of Trento, Trento, Italy"],"raw_orcid":"https://orcid.org/0000-0002-6682-4243","affiliations":[{"raw_affiliation_string":"University of Trento, Trento, Italy","institution_ids":["https://openalex.org/I193223587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080304452","display_name":"Duc\u2010Ly Vu","orcid":"https://orcid.org/0000-0002-5445-2729"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Duc-Ly Vu","raw_affiliation_strings":["University of Information Technology, Ho Chi Minh City, Vietnam"],"raw_orcid":"https://orcid.org/0000-0002-5445-2729","affiliations":[{"raw_affiliation_string":"University of Information Technology, Ho Chi Minh City, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085639552","display_name":"Fabio Massacci","orcid":"https://orcid.org/0000-0002-1091-8486"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]},{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["IT","NL"],"is_corresponding":false,"raw_author_name":"Fabio Massacci","raw_affiliation_strings":["University of Trento, Trento, Italy","Vrije Universiteit Amsterdam, Amsterdam, Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-1091-8486","affiliations":[{"raw_affiliation_string":"University of Trento, Trento, Italy","institution_ids":["https://openalex.org/I193223587"]},{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012313708","display_name":"Riccardo Scandariato","orcid":"https://orcid.org/0000-0003-3591-7671"},"institutions":[{"id":"https://openalex.org/I159176309","display_name":"Universit\u00e4t Hamburg","ror":"https://ror.org/00g30e956","country_code":"DE","type":"education","lineage":["https://openalex.org/I159176309"]},{"id":"https://openalex.org/I884043246","display_name":"Hamburg University of Technology","ror":"https://ror.org/04bs1pb34","country_code":"DE","type":"education","lineage":["https://openalex.org/I884043246"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Riccardo Scandariato","raw_affiliation_strings":["Hamburg University of Technology, Hamburg, Germany"],"raw_orcid":"https://orcid.org/0000-0003-3591-7671","affiliations":[{"raw_affiliation_string":"Hamburg University of Technology, Hamburg, Germany","institution_ids":["https://openalex.org/I159176309","https://openalex.org/I884043246"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5026800191"],"corresponding_institution_ids":["https://openalex.org/I159176309","https://openalex.org/I884043246"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":4.0341,"has_fulltext":true,"cited_by_count":19,"citation_normalized_percentile":{"value":0.96745077,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"29","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7606664896011353},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6755635738372803},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6401594877243042},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.6033315062522888},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.578035831451416},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5403902530670166},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.49932312965393066},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.4399717450141907},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.3714456558227539},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18593275547027588},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.1730971336364746},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.13011139631271362},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.10507550835609436}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7606664896011353},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6755635738372803},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6401594877243042},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.6033315062522888},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.578035831451416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5403902530670166},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.49932312965393066},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.4399717450141907},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.3714456558227539},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18593275547027588},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.1730971336364746},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.13011139631271362},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.10507550835609436}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1007/s10664-023-10415-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-023-10415-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-023-10415-7.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},{"id":"pmh:oai:research.vu.nl:openaire/faa9f6e5-cb1c-4ae4-b249-ef7bc9517fd6","is_oa":true,"landing_page_url":"https://research.vu.nl/en/publications/faa9f6e5-cb1c-4ae4-b249-ef7bc9517fd6","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Bui, Q C, Paramitha, R, Vu, D L, Massacci, F & Scandariato, R 2024, 'APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities', Empirical Software Engineering, vol. 29, 18, pp. 1-40. https://doi.org/10.1007/s10664-023-10415-7","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:tore.tuhh.de:11420/44621","is_oa":true,"landing_page_url":"https://hdl.handle.net/11420/44621","pdf_url":"https://tore.tuhh.de/bitstreams/79f8ee26-e206-4a41-88cf-8cb043222ce1/download","source":{"id":"https://openalex.org/S4306401751","display_name":"tub.dok (Hamburg University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I884043246","host_organization_name":"Hamburg University of Technology","host_organization_lineage":["https://openalex.org/I884043246"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:iris.unitn.it:11572/399034","is_oa":true,"landing_page_url":"https://link.springer.com/article/10.1007/s10664-023-10415-7#rightslink","pdf_url":null,"source":{"id":"https://openalex.org/S4306401913","display_name":"Institutional Research Information System (Universit\u00e0 degli Studi di Trento)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193223587","host_organization_name":"University of Trento","host_organization_lineage":["https://openalex.org/I193223587"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:research.vu.nl:publications/faa9f6e5-cb1c-4ae4-b249-ef7bc9517fd6","is_oa":true,"landing_page_url":"https://hdl.handle.net/1871.1/faa9f6e5-cb1c-4ae4-b249-ef7bc9517fd6","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bui, Q C, Paramitha, R, Vu, D L, Massacci, F & Scandariato, R 2024, 'APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities', Empirical Software Engineering, vol. 29, 18, pp. 1-40. https://doi.org/10.1007/s10664-023-10415-7","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"doi:10.15480/882.8936","is_oa":true,"landing_page_url":"https://doi.org/10.15480/882.8936","pdf_url":null,"source":{"id":"https://openalex.org/S7407052987","display_name":"TUHH Open Research","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.1007/s10664-023-10415-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-023-10415-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-023-10415-7.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5799999833106995,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G8760242886","display_name":null,"funder_award_id":"952647","funder_id":"https://openalex.org/F4320338475","funder_display_name":"H2020 LEIT Information and Communication Technologies"},{"id":"https://openalex.org/G8774649866","display_name":null,"funder_award_id":"101120393","funder_id":"https://openalex.org/F4320338442","funder_display_name":"HORIZON EUROPE Civil security for society"}],"funders":[{"id":"https://openalex.org/F4320338442","display_name":"HORIZON EUROPE Civil security for society","ror":null},{"id":"https://openalex.org/F4320338475","display_name":"H2020 LEIT Information and Communication Technologies","ror":null}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4389393572.pdf"},"referenced_works_count":83,"referenced_works":["https://openalex.org/W1480909796","https://openalex.org/W1972483830","https://openalex.org/W2022759867","https://openalex.org/W2047590718","https://openalex.org/W2130107753","https://openalex.org/W2145373440","https://openalex.org/W2156723666","https://openalex.org/W2274324447","https://openalex.org/W2285839903","https://openalex.org/W2344973853","https://openalex.org/W2400329213","https://openalex.org/W2400994325","https://openalex.org/W2465133314","https://openalex.org/W2518136680","https://openalex.org/W2537787699","https://openalex.org/W2582560208","https://openalex.org/W2620044036","https://openalex.org/W2736762043","https://openalex.org/W2745087117","https://openalex.org/W2762550985","https://openalex.org/W2767431443","https://openalex.org/W2767766265","https://openalex.org/W2767951593","https://openalex.org/W2784445699","https://openalex.org/W2791591648","https://openalex.org/W2794443436","https://openalex.org/W2795030435","https://openalex.org/W2795866244","https://openalex.org/W2796283679","https://openalex.org/W2850616187","https://openalex.org/W2867448323","https://openalex.org/W2883977877","https://openalex.org/W2886319709","https://openalex.org/W2895570420","https://openalex.org/W2904214673","https://openalex.org/W2905489084","https://openalex.org/W2950571912","https://openalex.org/W2951675980","https://openalex.org/W2954778170","https://openalex.org/W2958228760","https://openalex.org/W2963909831","https://openalex.org/W2963926786","https://openalex.org/W2965720427","https://openalex.org/W2967591898","https://openalex.org/W2974889942","https://openalex.org/W2998011150","https://openalex.org/W3039619065","https://openalex.org/W3084918652","https://openalex.org/W3089621332","https://openalex.org/W3094130708","https://openalex.org/W3100698844","https://openalex.org/W3102072242","https://openalex.org/W3103170042","https://openalex.org/W3103458892","https://openalex.org/W3104012431","https://openalex.org/W3106855263","https://openalex.org/W3129392041","https://openalex.org/W3134187657","https://openalex.org/W3134686229","https://openalex.org/W3137004499","https://openalex.org/W3156480510","https://openalex.org/W3160155705","https://openalex.org/W3161027892","https://openalex.org/W3175671591","https://openalex.org/W3177636638","https://openalex.org/W3193682477","https://openalex.org/W3194184668","https://openalex.org/W3196404481","https://openalex.org/W4206767299","https://openalex.org/W4207058373","https://openalex.org/W4211195953","https://openalex.org/W4231241365","https://openalex.org/W4240399292","https://openalex.org/W4246691913","https://openalex.org/W4255632703","https://openalex.org/W4284705844","https://openalex.org/W4285490396","https://openalex.org/W4294214983","https://openalex.org/W4297902814","https://openalex.org/W4308641648","https://openalex.org/W4312247631","https://openalex.org/W4384345778","https://openalex.org/W6912714007"],"related_works":["https://openalex.org/W1978034799","https://openalex.org/W4384518368","https://openalex.org/W2141388993","https://openalex.org/W2155353733","https://openalex.org/W2504659933","https://openalex.org/W2039943835","https://openalex.org/W2293245356","https://openalex.org/W2560421591","https://openalex.org/W1566131087","https://openalex.org/W2044639210"],"abstract_inverted_index":{"Abstract":[0],"Security":[1],"vulnerability":[2,196],"fixes":[3,237],"could":[4,163],"be":[5,270],"a":[6,120,182],"promising":[7],"research":[8],"avenue":[9],"for":[10,25,68,139,272],"Automated":[11],"Program":[12],"Repair":[13],"(APR)":[14],"techniques.":[15],"In":[16,45,59,259],"recent":[17],"years,":[18],"APR":[19,52,131,274],"tools":[20,53,90,132,275],"have":[21],"been":[22],"thoroughly":[23],"developed":[24],"fixing":[26,40],"generic":[27],"bugs.":[28,232],"However,":[29],"the":[30,74,80,89,106,111,129,143,151,156,170,174,187,195],"area":[31],"is":[32],"still":[33],"relatively":[34],"unexplored":[35],"when":[36],"it":[37],"comes":[38],"to":[39,65,93,96,135,230,276],"security":[41,98,166,211,236,281],"bugs":[42,167],"or":[43],"vulnerabilities.":[44,145,282],"this":[46,178,260],"paper,":[47],"we":[48,61,180,202],"evaluate":[49,88],"nine":[50],"state-of-the-art":[51],"and":[54,113,194,256],"one":[55],"vulnerability-specific":[56],"repair":[57,267],"tool.":[58],"particular,":[60],"investigate":[62],"their":[63,94,226],"ability":[64,95],"generate":[66,97,136],"patches":[67,99,138,153,212],"79":[69],"real-world":[70],"Java":[71],"vulnerabilities":[72],"in":[73,192,199,215,225],"Vul4J":[75],"dataset,":[76],"as":[77,79,251],"well":[78],"level":[81],"of":[82,84,109,123,142,150,161,177,186,217,219,280],"trustworthiness":[83],"these":[85],"patches.":[86],"We":[87],"with":[91],"respect":[92],"that":[100,128,265],"are":[101,213],"(i)":[102],"testable,":[103],"(ii)":[104],"having":[105,116],"positive":[107],"effect":[108],"closing":[110],"vulnerability,":[112],"(iii)":[114],"not":[115],"side":[117],"effects":[118],"from":[119,204],"functional":[121],"point":[122],"view.":[124],"Our":[125,206],"results":[126],"show":[127],"evaluated":[130],"were":[133],"able":[134],"testable":[137,152],"around":[140],"20%":[141],"considered":[144],"On":[146],"average,":[147],"nearly":[148],"73%":[149],"indeed":[154],"eliminate":[155],"vulnerabilities,":[157],"but":[158],"only":[159],"44%":[160],"them":[162],"actually":[164],"fix":[165,190,197,227,277],"while":[168],"maintaining":[169],"functionalities.":[171],"To":[172],"understand":[173],"root":[175],"cause":[176],"phenomenon,":[179],"conduct":[181],"detailed":[183],"comparative":[184],"study":[185,263],"general":[188,231],"bug":[189],"patterns":[191,198,228,268],"Defect4J":[193],"ExtraVul":[200],"(which":[201],"extend":[203],"Vul4J).":[205],"investigation":[207],"shows":[208],"that,":[209],"although":[210],"short":[214],"terms":[216],"lines":[218],"code,":[220],"they":[221],"contain":[222,245],"unique":[223],"characteristics":[224],"compared":[229],"For":[233],"example,":[234],"many":[235],"require":[238],"adding":[239],"method":[240,243],"calls.":[241],"These":[242],"calls":[244],"specific":[246],"input":[247],"validation-related":[248],"keywords,":[249],"such":[250],"encode":[252],",":[253,255],"normalize":[254],"trim":[257],".":[258],"regard,":[261],"our":[262],"suggests":[264],"additional":[266],"should":[269],"implemented":[271],"existing":[273],"more":[278],"types":[279]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":5}],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2025-10-10T00:00:00"}
