{"id":"https://openalex.org/W7125999546","doi":"https://doi.org/10.1109/ase63991.2025.00394","title":"Detecting Vulnerabilities from Issue Reports for Internet-of-Things","display_name":"Detecting Vulnerabilities from Issue Reports for Internet-of-Things","publication_year":2025,"publication_date":"2025-11-16","ids":{"openalex":"https://openalex.org/W7125999546","doi":"https://doi.org/10.1109/ase63991.2025.00394"},"language":null,"primary_location":{"id":"doi:10.1109/ase63991.2025.00394","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ase63991.2025.00394","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116734636","display_name":"Sogol Masoumzadeh","orcid":"https://orcid.org/0009-0002-6626-1919"},"institutions":[{"id":"https://openalex.org/I5023651","display_name":"McGill University","ror":"https://ror.org/01pxwe438","country_code":"CA","type":"education","lineage":["https://openalex.org/I5023651"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Sogol Masoumzadeh","raw_affiliation_strings":["McGill University,Electrical and Computer Engineering,Montreal,Canada"],"affiliations":[{"raw_affiliation_string":"McGill University,Electrical and Computer Engineering,Montreal,Canada","institution_ids":["https://openalex.org/I5023651"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5116734636"],"corresponding_institution_ids":["https://openalex.org/I5023651"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85455744,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4134","last_page":"4136"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3215000033378601,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3215000033378601,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.26429998874664307,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.07980000227689743,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eclipse","display_name":"Eclipse","score":0.6446999907493591},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5978999733924866},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.544700026512146},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.47999998927116394},{"id":"https://openalex.org/keywords/natural-language","display_name":"Natural language","score":0.44920000433921814},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.40689998865127563},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.39590001106262207}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7741000056266785},{"id":"https://openalex.org/C2778505590","wikidata":"https://www.wikidata.org/wiki/Q141022","display_name":"Eclipse","level":2,"score":0.6446999907493591},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5978999733924866},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.544700026512146},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5101000070571899},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.47999998927116394},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.44920000433921814},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4415000081062317},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41940000653266907},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.40689998865127563},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.39590001106262207},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.3677999973297119},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.35269999504089355},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3504999876022339},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.3452000021934509},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.30970001220703125},{"id":"https://openalex.org/C17020691","wikidata":"https://www.wikidata.org/wiki/Q139677","display_name":"Operator (biology)","level":5,"score":0.2939999997615814},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.27079999446868896},{"id":"https://openalex.org/C155092808","wikidata":"https://www.wikidata.org/wiki/Q182557","display_name":"Computational linguistics","level":2,"score":0.2653000056743622},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2563999891281128}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ase63991.2025.00394","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ase63991.2025.00394","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4182738661766052,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1651392559","https://openalex.org/W2023511777","https://openalex.org/W2062978452","https://openalex.org/W2108728387","https://openalex.org/W2112736324","https://openalex.org/W2133286915","https://openalex.org/W2216946510","https://openalex.org/W2250539671","https://openalex.org/W2781021471","https://openalex.org/W2808393507","https://openalex.org/W2914190575","https://openalex.org/W2971521116","https://openalex.org/W2993452100","https://openalex.org/W3000274722","https://openalex.org/W3106109117","https://openalex.org/W4230076091","https://openalex.org/W4382246105"],"related_works":[],"abstract_inverted_index":{"Timely":[0],"identification":[1],"of":[2,68,116,127],"issue":[3,144],"reports":[4],"reflecting":[5],"software":[6],"vulnerabilities":[7,142],"is":[8,16],"crucial,":[9],"particularly":[10],"for":[11,87,138],"Internet-of-Things":[12],"(IoT)":[13],"where":[14],"analysis":[15],"slower":[17],"than":[18],"non-IoT":[19,34,148],"systems.":[20,149],"While":[21],"Machine":[22,99],"Learning":[23],"(ML)":[24],"and":[25,56,73],"Large":[26],"Language":[27,60,80],"Models":[28],"(LLMs)":[29],"detect":[30,65],"vulnerability-indicating":[31,66,89],"issues":[32,67,86],"in":[33],"systems,":[35],"their":[36],"IoT":[37,71,141],"use":[38],"remains":[39],"unexplored.":[40],"We":[41],"are":[42],"the":[43,110,125,136],"first":[44],"to":[45,64,95,147],"tackle":[46],"this":[47],"problem":[48],"by":[49],"proposing":[50],"two":[51],"approaches:":[52],"(1)":[53],"combining":[54],"ML":[55],"LLMs":[57],"with":[58],"Natural":[59],"Processing":[61],"(NLP)":[62],"techniques":[63],"21":[69],"Eclipse":[70],"projects":[72],"(2)":[74],"fine-tuning":[75],"a":[76,96],"pre-trained":[77],"BERT":[78,103,120],"Masked":[79],"Model":[81],"(MLM)":[82],"on":[83,102],"11,000":[84],"GitHub":[85],"classifying":[88],"issues.":[90],"Our":[91,133],"best":[92],"performance":[93],"belongs":[94],"Support":[97],"Vector":[98],"(SVM)":[100],"trained":[101],"NLP":[104],"features,":[105],"achieving":[106],"an":[107],"Area":[108],"Under":[109],"receiver":[111],"operator":[112],"characteristic":[113],"Curve":[114],"(AUC)":[115],"0.65.":[117],"The":[118],"fine-tuned":[119],"achieves":[121],"0.26":[122],"accuracy,":[123],"emphasizing":[124],"importance":[126],"exposing":[128],"all":[129],"data":[130],"during":[131],"training.":[132],"contributions":[134],"set":[135],"stage":[137],"accurately":[139],"detecting":[140],"from":[143],"reports,":[145],"similar":[146]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
