{"id":"https://openalex.org/W7117875406","doi":"https://doi.org/10.1109/milcom64451.2025.11310199","title":"Generative Model-Driven Code Creation and Vulnerability Analysis for Developmental Applications","display_name":"Generative Model-Driven Code Creation and Vulnerability Analysis for Developmental Applications","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W7117875406","doi":"https://doi.org/10.1109/milcom64451.2025.11310199"},"language":null,"primary_location":{"id":"doi:10.1109/milcom64451.2025.11310199","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom64451.2025.11310199","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121728053","display_name":"Noah Reneau","orcid":null},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Noah Reneau","raw_affiliation_strings":["Johns Hopkins University,Department of Computer Science,Baltimore,USA"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University,Department of Computer Science,Baltimore,USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113283941","display_name":"K. Stein","orcid":"https://orcid.org/0009-0005-4706-5797"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kyle Stein","raw_affiliation_strings":["Johns Hopkins University,Department of Computer Science,Baltimore,USA"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University,Department of Computer Science,Baltimore,USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053845764","display_name":"Brian K. Walker","orcid":"https://orcid.org/0000-0001-8385-7066"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brian Walker","raw_affiliation_strings":["Johns Hopkins University,Department of Computer Science,Baltimore,USA"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University,Department of Computer Science,Baltimore,USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050537116","display_name":"Seth Vinson","orcid":null},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Seth Vinson","raw_affiliation_strings":["Johns Hopkins University,Department of Computer Science,Baltimore,USA"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University,Department of Computer Science,Baltimore,USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035321347","display_name":"Lanier Watkins","orcid":"https://orcid.org/0000-0002-3322-1833"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lanier Watkins","raw_affiliation_strings":["Johns Hopkins University,Department of Computer Science,Baltimore,USA"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University,Department of Computer Science,Baltimore,USA","institution_ids":["https://openalex.org/I145311948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5121728053"],"corresponding_institution_ids":["https://openalex.org/I145311948"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.68212197,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.22010000050067902,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.22010000050067902,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.1526000052690506,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11574","display_name":"Artificial Intelligence in Games","score":0.12489999830722809,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5332000255584717},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.505299985408783},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.461899995803833},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.45879998803138733},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.448199987411499},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4481000006198883},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.44620001316070557},{"id":"https://openalex.org/keywords/realm","display_name":"Realm","score":0.4449999928474426}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7178000211715698},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5332000255584717},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.505299985408783},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.490200012922287},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.489300012588501},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.461899995803833},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.45879998803138733},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.448199987411499},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4481000006198883},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.44620001316070557},{"id":"https://openalex.org/C2778757428","wikidata":"https://www.wikidata.org/wiki/Q1250464","display_name":"Realm","level":2,"score":0.4449999928474426},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4043999910354614},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3813000023365021},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.3456999957561493},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3382999897003174},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.3314000070095062},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.31279999017715454},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.30959999561309814},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2892000079154968},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.2849999964237213},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.27129998803138733},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.2565999925136566}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom64451.2025.11310199","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom64451.2025.11310199","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W4220891756","https://openalex.org/W4399169325","https://openalex.org/W4405103986","https://openalex.org/W4406461225","https://openalex.org/W4406911631","https://openalex.org/W4408017619"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,12,19,29,85,94,120,137,151,154,194,208],"recent":[2],"societal":[3],"implications":[4],"of":[5,14,23,31,70,139,153,200,211],"generative":[6],"artificial":[7],"intelligence":[8],"(AI),":[9],"particularly":[10],"in":[11,28,55,124,190],"realm":[13],"software":[15],"development,":[16],"concerns":[17],"about":[18],"reliability":[20],"and":[21,33,47,106,178],"security":[22,152,183],"AI-generated":[24,155,188],"code":[25,123,156,189],"becomes":[26],"paramount":[27],"minds":[30],"researchers":[32],"organizations":[34],"alike.":[35],"This":[36],"paper":[37],"examines":[38],"whether":[39],"large":[40],"language":[41],"models":[42],"(LLMs)":[43],"can":[44,167],"develop":[45,214],"effective":[46],"secure":[48],"tools":[49],"for":[50,78],"auditing":[51],"AI-developed":[52],"autonomous":[53],"agents":[54],"a":[56,67,76,97,100,103,107],"competitive":[57],"game":[58],"environment.":[59],"To":[60],"model":[61],"this":[62,201],"scenario,":[63],"we":[64],"focus":[65],"on":[66],"modified":[68],"version":[69],"weighted":[71],"Rock-Paper-Scissors,":[72],"specifically":[73],"Glico,":[74],"as":[75,147,149],"testbed":[77],"adversarial":[79],"AI":[80,215],"competition.":[81],"We":[82,135],"then":[83],"prompted":[84],"LLM":[86,121],"to":[87,92,126,145,204,213],"generate":[88,168],"various":[89],"strategy":[90],"bots":[91],"play":[93],"game,":[95],"including:":[96],"pattern-based":[98],"bot,":[99,102,105],"cyclic-strategy":[101],"random-move":[104],"reinforcement":[108],"learning":[109],"bot":[110,114,141],"using":[111,157],"Q-learning.":[112],"The":[113,198],"development":[115],"process":[116],"was":[117],"iterative,":[118],"with":[119],"refining":[122],"response":[125],"functional":[127,169],"errors":[128],"identified":[129],"through":[130],"custom":[131],"dynamic":[132],"testing":[133],"strategies.":[134],"evaluated":[136],"performance":[138],"each":[140],"(win/loss":[142],"rates,":[143],"time":[144],"win),":[146],"well":[148],"analyzed":[150],"static":[158],"analysis":[159],"tools.":[160],"Our":[161],"results":[162,199],"demonstrate":[163],"that":[164],"while":[165],"LLMs":[166,212],"game-playing":[170],"agents,":[171],"doing":[172],"so":[173],"requires":[174],"multiple":[175],"prompt":[176],"iterations":[177],"human":[179],"guidance.":[180],"Even":[181],"then,":[182],"vulnerabilities":[184],"remain":[185],"when":[186],"deploying":[187],"user-created":[191],"environments":[192],"like":[193],"tested":[195],"gaming":[196],"platform.":[197],"project":[202],"aim":[203],"provide":[205],"insight":[206],"into":[207],"practical":[209],"potential":[210],"within":[216],"restricted,":[217],"goal-driven":[218],"environments.":[219]},"counts_by_year":[],"updated_date":"2026-01-02T23:11:23.791532","created_date":"2026-01-01T00:00:00"}
