{"id":"https://openalex.org/W6959659194","doi":"https://doi.org/10.1109/tse.2025.3548168","title":"SecureFalcon: Are We There Yet in Automated Software Vulnerability Detection With LLMs?","display_name":"SecureFalcon: Are We There Yet in Automated Software Vulnerability Detection With LLMs?","publication_year":2025,"publication_date":"2025-03-05","ids":{"openalex":"https://openalex.org/W6959659194","doi":"https://doi.org/10.1109/tse.2025.3548168"},"language":"en","primary_location":{"id":"doi:10.1109/tse.2025.3548168","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2025.3548168","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.manchester.ac.uk/en/publications/09c2efdb-1d79-4bfe-88b6-6d529c1380a7","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mohamed Amine Ferrag","orcid":"https://orcid.org/0000-0002-0632-3172"},"institutions":[{"id":"https://openalex.org/I4210097536","display_name":"University of Guelma","ror":"https://ror.org/00xe6p546","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210097536"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Mohamed Amine Ferrag","raw_affiliation_strings":["Guelma University, Guelma, Algeria"],"affiliations":[{"raw_affiliation_string":"Guelma University, Guelma, Algeria","institution_ids":["https://openalex.org/I4210097536"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ammar Battah","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ammar Battah","raw_affiliation_strings":["Technology Innovation Institute, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Norbert Tihanyi","orcid":"https://orcid.org/0000-0002-9002-5935"},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Norbert Tihanyi","raw_affiliation_strings":["Technology Innovation Institute, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ridhi Jain","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ridhi Jain","raw_affiliation_strings":["Technology Innovation Institute, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Diana Maimu\u0163","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Diana Maimu\u0163","raw_affiliation_strings":["Technology Innovation Institute, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Fatima Alwahedi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Fatima Alwahedi","raw_affiliation_strings":["Technology Innovation Institute, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Thierry Lestable","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Thierry Lestable","raw_affiliation_strings":["Technology Innovation Institute, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Narinderjit Singh Thandi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Narinderjit Singh Thandi","raw_affiliation_strings":["Technology Innovation Institute, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Abdechakour Mechri","orcid":"https://orcid.org/0009-0002-6937-9373"},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Abdechakour Mechri","raw_affiliation_strings":["Technology Innovation Institute, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Merouane Debbah","orcid":"https://orcid.org/0000-0001-8941-8080"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Merouane Debbah","raw_affiliation_strings":["Khalifa University of Science and Technology, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Khalifa University of Science and Technology, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"last","author":{"id":null,"display_name":"Lucas C. Cordeiro","orcid":"https://orcid.org/0000-0002-6235-4272"},"institutions":[{"id":"https://openalex.org/I28407311","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27","country_code":"GB","type":"education","lineage":["https://openalex.org/I28407311"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Lucas C. Cordeiro","raw_affiliation_strings":["University of Manchester, Manchester, U.K"],"affiliations":[{"raw_affiliation_string":"University of Manchester, Manchester, U.K","institution_ids":["https://openalex.org/I28407311"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":11,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210097536"],"apc_list":null,"apc_paid":null,"fwci":49.5459,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":1.0,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"51","issue":"4","first_page":"1248","last_page":"1265"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T13069","display_name":"Cocoa and Sweet Potato Agronomy","score":0.09399999678134918,"subfield":{"id":"https://openalex.org/subfields/1108","display_name":"Horticulture"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T13069","display_name":"Cocoa and Sweet Potato Agronomy","score":0.09399999678134918,"subfield":{"id":"https://openalex.org/subfields/1108","display_name":"Horticulture"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12473","display_name":"Pacific and Southeast Asian Studies","score":0.05860000103712082,"subfield":{"id":"https://openalex.org/subfields/3305","display_name":"Geography, Planning and Development"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11750","display_name":"Phytoplasmas and Hemiptera pathogens","score":0.05849999934434891,"subfield":{"id":"https://openalex.org/subfields/1110","display_name":"Plant Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5701000094413757},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.5047000050544739},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5044000148773193},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.49630001187324524},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.42719998955726624},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4269999861717224},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4244999885559082},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4205999970436096},{"id":"https://openalex.org/keywords/software-metric","display_name":"Software metric","score":0.399399995803833},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.39500001072883606}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8876000046730042},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5701000094413757},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.5047000050544739},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5044000148773193},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.49630001187324524},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4758000075817108},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.46320000290870667},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.43140000104904175},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.42719998955726624},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4269999861717224},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4244999885559082},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4205999970436096},{"id":"https://openalex.org/C82214349","wikidata":"https://www.wikidata.org/wiki/Q657339","display_name":"Software metric","level":5,"score":0.399399995803833},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.39500001072883606},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.36250001192092896},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.36239999532699585},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.36090001463890076},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.36039999127388},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35370001196861267},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.3521000146865845},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.34790000319480896},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.31439998745918274},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.30959999561309814},{"id":"https://openalex.org/C48002344","wikidata":"https://www.wikidata.org/wiki/Q2919644","display_name":"Verification and validation","level":2,"score":0.29820001125335693},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.2962999939918518},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.2903999984264374},{"id":"https://openalex.org/C35869016","wikidata":"https://www.wikidata.org/wiki/Q846636","display_name":"Software architecture","level":3,"score":0.28459998965263367},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.26820001006126404},{"id":"https://openalex.org/C201515116","wikidata":"https://www.wikidata.org/wiki/Q7554363","display_name":"Software sizing","level":5,"score":0.2667999863624573},{"id":"https://openalex.org/C2779432360","wikidata":"https://www.wikidata.org/wiki/Q16963779","display_name":"Instant","level":2,"score":0.2630999982357025},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2581000030040741},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.25459998846054077},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.25369998812675476},{"id":"https://openalex.org/C89567784","wikidata":"https://www.wikidata.org/wiki/Q7554325","display_name":"Software measurement","level":5,"score":0.25270000100135803}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tse.2025.3548168","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2025.3548168","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire/09c2efdb-1d79-4bfe-88b6-6d529c1380a7","is_oa":true,"landing_page_url":"https://research.manchester.ac.uk/en/publications/09c2efdb-1d79-4bfe-88b6-6d529c1380a7","pdf_url":null,"source":{"id":"https://openalex.org/S4306400662","display_name":"Research Explorer (The University of Manchester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28407311","host_organization_name":"University of Manchester","host_organization_lineage":["https://openalex.org/I28407311"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ferrag, M A, Battah, A, Tihanyi, N, Jain, R, Maimu\u0163, D, Alwahedi, F, Lestable, T, Thandi, N S, Mechri, A, Debbah, M & Cordeiro, L C 2025, 'SecureFalcon: Are We There Yet in Automated Software Vulnerability Detection with LLMs?', IEEE Transactions on Software Engineering, pp. 1-18. https://doi.org/10.1109/TSE.2025.3548168","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/09c2efdb-1d79-4bfe-88b6-6d529c1380a7","is_oa":true,"landing_page_url":"https://research.manchester.ac.uk/en/publications/09c2efdb-1d79-4bfe-88b6-6d529c1380a7","pdf_url":null,"source":{"id":"https://openalex.org/S4306400662","display_name":"Research Explorer (The University of Manchester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28407311","host_organization_name":"University of Manchester","host_organization_lineage":["https://openalex.org/I28407311"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ferrag, M A, Battah, A, Tihanyi, N, Jain, R, Maimu\u0163, D, Alwahedi, F, Lestable, T, Thandi, N S, Mechri, A, Debbah, M & Cordeiro, L C 2025, 'SecureFalcon: Are We There Yet in Automated Software Vulnerability Detection with LLMs?', IEEE Transactions on Software Engineering, pp. 1-18. https://doi.org/10.1109/TSE.2025.3548168","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W1480909796","https://openalex.org/W1498436455","https://openalex.org/W1994584977","https://openalex.org/W2051356522","https://openalex.org/W2081553013","https://openalex.org/W2101211404","https://openalex.org/W2634106992","https://openalex.org/W2781491433","https://openalex.org/W2802300457","https://openalex.org/W2885030880","https://openalex.org/W2888223970","https://openalex.org/W2888321432","https://openalex.org/W2912640545","https://openalex.org/W2965861627","https://openalex.org/W3091588759","https://openalex.org/W3093266389","https://openalex.org/W3097867666","https://openalex.org/W3098605233","https://openalex.org/W3127782461","https://openalex.org/W3156480510","https://openalex.org/W3166095789","https://openalex.org/W3187025053","https://openalex.org/W4210493608","https://openalex.org/W4212863985","https://openalex.org/W4225922019","https://openalex.org/W4285407531","https://openalex.org/W4285490489","https://openalex.org/W4294170691","https://openalex.org/W4312436517","https://openalex.org/W4312690534","https://openalex.org/W4313547549","https://openalex.org/W4321354332","https://openalex.org/W4384302785","https://openalex.org/W4384521894","https://openalex.org/W4385245566","https://openalex.org/W4386824896","https://openalex.org/W4387298393","https://openalex.org/W4388979610","https://openalex.org/W4389215044","https://openalex.org/W4390933267","https://openalex.org/W4393942893","https://openalex.org/W6635300605","https://openalex.org/W6678934100","https://openalex.org/W6713441810","https://openalex.org/W6755207826","https://openalex.org/W6755977528","https://openalex.org/W6757817989","https://openalex.org/W6766673545","https://openalex.org/W6772383348","https://openalex.org/W6773813882","https://openalex.org/W6778883912","https://openalex.org/W6780226713","https://openalex.org/W6854733946","https://openalex.org/W6858453470","https://openalex.org/W6860380154"],"related_works":[],"abstract_inverted_index":{"Software":[0],"vulnerabilities":[1],"can":[2,19,51],"cause":[3],"numerous":[4],"problems,":[5],"including":[6],"crashes,":[7],"data":[8],"loss,":[9],"and":[10,18,28,64,79,113,136,158,182,193,213,226],"security":[11],"breaches.":[12],"These":[13,161],"issues":[14],"greatly":[15],"compromise":[16],"quality":[17],"negatively":[20],"impact":[21],"the":[22,110,122,133,137,149,164,220],"market":[23],"adoption":[24],"of":[25,47,144,222],"software":[26,118,169,223],"applications":[27],"systems.":[29],"Traditional":[30],"bug-fixing":[31],"methods,":[32],"such":[33,171,208],"as":[34,172,209],"static":[35,58],"analysis,":[36],"often":[37],"produce":[38],"false":[39],"positives.":[40],"While":[41],"bounded":[42],"model":[43,101,112,128],"checking,":[44],"a":[45,142],"form":[46],"Formal":[48],"Verification":[49],"(FV),":[50],"provide":[52],"more":[53],"accurate":[54],"outcomes":[55],"compared":[56],"to":[57,76,195,218],"analyzers,":[59],"it":[60],"demands":[61],"substantial":[62],"resources":[63],"significantly":[65],"hinders":[66],"developer":[67],"productivity.":[68],"Can":[69],"Machine":[70],"Learning":[71],"(ML)":[72],"achieve":[73,121],"accuracy":[74,189],"comparable":[75],"FV":[77],"methods":[78],"be":[80],"used":[81],"in":[82,88,190,197],"popular":[83],"instant":[84,200,227],"code":[85,228],"completion":[86,229],"frameworks":[87],"near":[89],"real-time?":[90],"In":[91],"this":[92],"paper,":[93],"we":[94,125],"introduce":[95],"<monospace":[96,184],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[97,185],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SecureFalcon</monospace>,":[98],"an":[99],"innovative":[100],"architecture":[102],"with":[103,199],"only":[104],"121":[105],"million":[106],"parameters":[107],"derived":[108],"from":[109],"Falcon-40B":[111],"explicitly":[114],"tailored":[115],"for":[116],"classifying":[117],"vulnerabilities.":[119],"To":[120],"best":[123],"performance,":[124],"trained":[126],"our":[127],"using":[129],"two":[130],"datasets,":[131,147],"namely":[132,148],"FormAI":[134],"dataset":[135],"FalconVulnDB.":[138],"The":[139],"FalconVulnDB":[140],"is":[141],"combination":[143],"recent":[145],"public":[146],"SySeVR":[150],"framework,":[151],"Draper":[152],"VDISC,":[153],"Bigvul,":[154],"Diversevul,":[155],"SARD":[156],"Juliet,":[157],"ReVeal":[159],"datasets.":[160],"datasets":[162],"contain":[163],"top":[165],"25":[166],"most":[167],"dangerous":[168],"weaknesses,":[170],"CWE-119,":[173],"CWE-120,":[174],"CWE-476,":[175],"CWE-122,":[176],"CWE-190,":[177],"CWE-121,":[178],"CWE-78,":[179],"CWE-787,":[180],"CWE-20,":[181],"CWE-762.":[183],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SecureFalcon</monospace>":[186],"achieves":[187],"94%":[188],"binary":[191],"classification":[192],"up":[194],"92%":[196],"multiclassification,":[198],"CPU":[201],"inference":[202],"times.":[203],"It":[204],"outperforms":[205],"existing":[206],"models":[207],"BERT,":[210],"RoBERTa,":[211],"CodeBERT,":[212],"traditional":[214],"ML":[215],"algorithms,":[216],"promising":[217],"push":[219],"boundaries":[221],"vulnerability":[224],"detection":[225],"frameworks.":[230]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
