{"id":"https://openalex.org/W4415746186","doi":"https://doi.org/10.1109/icsme64153.2025.00095","title":"Ensuring Code Integrity in the Era of AI-Assisted Software Development","display_name":"Ensuring Code Integrity in the Era of AI-Assisted Software Development","publication_year":2025,"publication_date":"2025-09-07","ids":{"openalex":"https://openalex.org/W4415746186","doi":"https://doi.org/10.1109/icsme64153.2025.00095"},"language":null,"primary_location":{"id":"doi:10.1109/icsme64153.2025.00095","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsme64153.2025.00095","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107114063","display_name":"Arthur Pilone","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Arthur Pilone","raw_affiliation_strings":["University of S&#x00E3;o Paulo"],"affiliations":[{"raw_affiliation_string":"University of S&#x00E3;o Paulo","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5107114063"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.47018182,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"870","last_page":"872"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.5910000205039978,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.5910000205039978,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.08160000294446945,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.02879999950528145,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.617900013923645},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.47099998593330383},{"id":"https://openalex.org/keywords/software-peer-review","display_name":"Software peer review","score":0.4684000015258789},{"id":"https://openalex.org/keywords/package-development-process","display_name":"Package development process","score":0.46650001406669617},{"id":"https://openalex.org/keywords/social-software-engineering","display_name":"Social software engineering","score":0.4519999921321869},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.42500001192092896},{"id":"https://openalex.org/keywords/personal-software-process","display_name":"Personal software process","score":0.39419999718666077},{"id":"https://openalex.org/keywords/backporting","display_name":"Backporting","score":0.3749000132083893},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.36739999055862427}],"concepts":[{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.6748999953269958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6186000108718872},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.617900013923645},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.47099998593330383},{"id":"https://openalex.org/C74579156","wikidata":"https://www.wikidata.org/wiki/Q7554342","display_name":"Software peer review","level":5,"score":0.4684000015258789},{"id":"https://openalex.org/C123551368","wikidata":"https://www.wikidata.org/wiki/Q7122888","display_name":"Package development process","level":5,"score":0.46650001406669617},{"id":"https://openalex.org/C182500959","wikidata":"https://www.wikidata.org/wiki/Q7551380","display_name":"Social software engineering","level":5,"score":0.4519999921321869},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.42500001192092896},{"id":"https://openalex.org/C39890963","wikidata":"https://www.wikidata.org/wiki/Q1702721","display_name":"Personal software process","level":5,"score":0.39419999718666077},{"id":"https://openalex.org/C21491501","wikidata":"https://www.wikidata.org/wiki/Q430253","display_name":"Backporting","level":5,"score":0.3749000132083893},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.36739999055862427},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.35920000076293945},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3562999963760376},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.3522000014781952},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.33660000562667847},{"id":"https://openalex.org/C51845450","wikidata":"https://www.wikidata.org/wiki/Q1421651","display_name":"Team software process","level":5,"score":0.32429999113082886},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.32260000705718994},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.32109999656677246},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.320499986410141},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.310699999332428},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.3086000084877014},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.30660000443458557},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3012999892234802},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.29910001158714294},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C10272871","wikidata":"https://www.wikidata.org/wiki/Q929972","display_name":"Software inspection","level":5,"score":0.2702000141143799},{"id":"https://openalex.org/C40919944","wikidata":"https://www.wikidata.org/wiki/Q947779","display_name":"Software project management","level":5,"score":0.2526000142097473},{"id":"https://openalex.org/C202105479","wikidata":"https://www.wikidata.org/wiki/Q265013","display_name":"Software evolution","level":5,"score":0.2517000138759613},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.2515000104904175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsme64153.2025.00095","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsme64153.2025.00095","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1515587369","https://openalex.org/W1590137713","https://openalex.org/W2462281795","https://openalex.org/W2509993493","https://openalex.org/W2735864825","https://openalex.org/W2921988748","https://openalex.org/W4247854836","https://openalex.org/W4284709233","https://openalex.org/W4313547549","https://openalex.org/W4391307510","https://openalex.org/W4391974554","https://openalex.org/W4395029328","https://openalex.org/W4396820575","https://openalex.org/W4400593390","https://openalex.org/W4400770977","https://openalex.org/W4403122846","https://openalex.org/W4403606334","https://openalex.org/W4404952914","https://openalex.org/W4406495600","https://openalex.org/W4411551806","https://openalex.org/W4411551908","https://openalex.org/W4411552217","https://openalex.org/W4411552825","https://openalex.org/W4415745867"],"related_works":[],"abstract_inverted_index":{"Generative":[0],"artificial":[1],"intelligence":[2],"(GenAI)":[3],"has":[4,29],"taken":[5],"software":[6,92,112,157,167,192],"engineering":[7],"by":[8,68,121],"storm,":[9],"as":[10,86],"large":[11,20],"language":[12],"models":[13,39],"(LLMs)":[14],"have":[15,40,47],"quickly":[16],"come":[17],"to":[18,82,136,163,171,178],"generate":[19],"volumes":[21],"of":[22,73,111,130,148],"human-like":[23],"text":[24],"and":[25,60,109,139,145,159,175,194],"code.":[26,45,151],"Recent":[27],"work":[28],"shown":[30],"that,":[31],"although":[32],"excellent":[33],"at":[34],"mimicking":[35],"human":[36],"writing,":[37],"these":[38],"challenging":[41],"limitations":[42],"when":[43],"writing":[44],"Authors":[46],"identified":[48],"how":[49,102,123],"the":[50,71,87,106,118,133,142,146,149,173,180,187],"code":[51,104,125],"generated":[52],"can":[53],"be":[54],"longer,":[55],"more":[56,62],"complex,":[57],"worse":[58],"performing,":[59],"contain":[61],"serious":[63],"vulnerabilities":[64],"than":[65],"that":[66],"written":[67],"humans.":[69],"As":[70],"use":[72],"GenAI":[74,185],"now":[75],"shifts":[76],"from":[77,184],"a":[78,94],"bleeding":[79],"edge":[80],"novelty":[81],"an":[83],"amenity":[84],"consolidated":[85],"new":[88,161],"status":[89],"quo":[90],"for":[91,166,190],"engineering,":[93,168],"pressing":[95],"concern":[96,120],"arises:":[97],"It":[98],"is":[99],"still":[100],"unclear":[101],"AI-written":[103,124],"impacts":[105,126],"long-term":[107,191],"maintenance":[108,193],"evolution":[110],"codebases.":[113],"This":[114],"PhD":[115],"project":[116],"investigates":[117],"previous":[119],"studying":[122],"four":[127],"key":[128],"qualities":[129],"source":[131,150],"code:":[132],"system's":[134],"ability":[135],"fulfill":[137],"functional":[138],"non-functional":[140],"requirements,":[141],"architectural":[143],"cohesion,":[144],"comprehensibility":[147],"By":[152],"interacting":[153],"with":[154,186],"practitioners,":[155],"analyzing":[156],"repositories,":[158],"proposing":[160],"approaches":[162],"using":[164],"LLMs":[165],"we":[169],"expect":[170],"develop":[172],"theory":[174],"basis":[176],"necessary":[177],"balance":[179],"benefits":[181],"in":[182],"productivity":[183],"everpressing":[188],"needs":[189],"evolution.":[195]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-31T00:00:00"}
