{"id":"https://openalex.org/W4285490396","doi":"https://doi.org/10.1145/3533767.3543291","title":"Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities","display_name":"Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities","publication_year":2022,"publication_date":"2022-07-15","ids":{"openalex":"https://openalex.org/W4285490396","doi":"https://doi.org/10.1145/3533767.3543291"},"language":"en","primary_location":{"id":"doi:10.1145/3533767.3543291","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3533767.3543291","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3533767.3543291","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3533767.3543291","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018159625","display_name":"Eduard Pinconschi","orcid":"https://orcid.org/0000-0002-0729-4684"},"institutions":[{"id":"https://openalex.org/I121345201","display_name":"Instituto de Engenharia de Sistemas e Computadores Investiga\u00e7\u00e3o e Desenvolvimento","ror":"https://ror.org/04mqy3p58","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I121345201","https://openalex.org/I4210125590"]},{"id":"https://openalex.org/I182534213","display_name":"Universidade do Porto","ror":"https://ror.org/043pwc612","country_code":"PT","type":"education","lineage":["https://openalex.org/I182534213"]}],"countries":["PT"],"is_corresponding":true,"raw_author_name":"Eduard Pinconschi","raw_affiliation_strings":["INESC-ID, Portugal / University of Porto, Portugal"],"affiliations":[{"raw_affiliation_string":"INESC-ID, Portugal / University of Porto, Portugal","institution_ids":["https://openalex.org/I121345201","https://openalex.org/I182534213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026800191","display_name":"Quang-Cuong Bui","orcid":"https://orcid.org/0000-0001-6072-9213"},"institutions":[{"id":"https://openalex.org/I159176309","display_name":"Universit\u00e4t Hamburg","ror":"https://ror.org/00g30e956","country_code":"DE","type":"education","lineage":["https://openalex.org/I159176309"]},{"id":"https://openalex.org/I884043246","display_name":"Hamburg University of Technology","ror":"https://ror.org/04bs1pb34","country_code":"DE","type":"education","lineage":["https://openalex.org/I884043246"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Quang-Cuong Bui","raw_affiliation_strings":["Hamburg University of Technology, Germany"],"affiliations":[{"raw_affiliation_string":"Hamburg University of Technology, Germany","institution_ids":["https://openalex.org/I159176309","https://openalex.org/I884043246"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Rui Abreu","orcid":null},"institutions":[{"id":"https://openalex.org/I121345201","display_name":"Instituto de Engenharia de Sistemas e Computadores Investiga\u00e7\u00e3o e Desenvolvimento","ror":"https://ror.org/04mqy3p58","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I121345201","https://openalex.org/I4210125590"]},{"id":"https://openalex.org/I182534213","display_name":"Universidade do Porto","ror":"https://ror.org/043pwc612","country_code":"PT","type":"education","lineage":["https://openalex.org/I182534213"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Rui Abreu","raw_affiliation_strings":["INESC-ID, Portugal / University of Porto, Portugal"],"affiliations":[{"raw_affiliation_string":"INESC-ID, Portugal / University of Porto, Portugal","institution_ids":["https://openalex.org/I121345201","https://openalex.org/I182534213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003234860","display_name":"Pedro Ad\u00e3o","orcid":"https://orcid.org/0000-0002-4049-1954"},"institutions":[{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Pedro Ad\u00e3o","raw_affiliation_strings":["IST-ULisboa, Portugal / Instituto de Telecomunica\u00e7\u00f5es, Portugal"],"affiliations":[{"raw_affiliation_string":"IST-ULisboa, Portugal / Instituto de Telecomunica\u00e7\u00f5es, Portugal","institution_ids":["https://openalex.org/I4210120471"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012313708","display_name":"Riccardo Scandariato","orcid":"https://orcid.org/0000-0003-3591-7671"},"institutions":[{"id":"https://openalex.org/I159176309","display_name":"Universit\u00e4t Hamburg","ror":"https://ror.org/00g30e956","country_code":"DE","type":"education","lineage":["https://openalex.org/I159176309"]},{"id":"https://openalex.org/I884043246","display_name":"Hamburg University of Technology","ror":"https://ror.org/04bs1pb34","country_code":"DE","type":"education","lineage":["https://openalex.org/I884043246"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Riccardo Scandariato","raw_affiliation_strings":["Hamburg University of Technology, Germany"],"affiliations":[{"raw_affiliation_string":"Hamburg University of Technology, Germany","institution_ids":["https://openalex.org/I159176309","https://openalex.org/I884043246"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5018159625"],"corresponding_institution_ids":["https://openalex.org/I121345201","https://openalex.org/I182534213"],"apc_list":null,"apc_paid":null,"fwci":2.4752,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.88795779,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"789","last_page":"792"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7883520722389221},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5516161918640137},{"id":"https://openalex.org/keywords/plug-in","display_name":"Plug-in","score":0.5483444929122925},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5452982187271118},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.5394030809402466},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.5013659000396729},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.47904789447784424},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.46499741077423096},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.43518784642219543},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.42801812291145325},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.42457252740859985},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.38393813371658325},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.21935319900512695},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1795896589756012},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.1336820125579834},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12213513255119324}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7883520722389221},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5516161918640137},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.5483444929122925},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5452982187271118},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.5394030809402466},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.5013659000396729},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.47904789447784424},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.46499741077423096},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.43518784642219543},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.42801812291145325},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.42457252740859985},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.38393813371658325},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.21935319900512695},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1795896589756012},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.1336820125579834},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12213513255119324},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3533767.3543291","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3533767.3543291","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3533767.3543291","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},{"id":"pmh:oai:tore.tuhh.de:11420/13587","is_oa":false,"landing_page_url":"http://hdl.handle.net/11420/13587","pdf_url":null,"source":{"id":"https://openalex.org/S4306401751","display_name":"tub.dok (Hamburg University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I884043246","host_organization_name":"Hamburg University of Technology","host_organization_lineage":["https://openalex.org/I884043246"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"}],"best_oa_location":{"id":"doi:10.1145/3533767.3543291","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3533767.3543291","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3533767.3543291","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4285490396.pdf","grobid_xml":"https://content.openalex.org/works/W4285490396.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W23405769","https://openalex.org/W1991155991","https://openalex.org/W2031508806","https://openalex.org/W2512083105","https://openalex.org/W2745087117","https://openalex.org/W2898887472","https://openalex.org/W2960756002","https://openalex.org/W2967591898","https://openalex.org/W2974889942","https://openalex.org/W2980012492","https://openalex.org/W3129269689","https://openalex.org/W3137004499","https://openalex.org/W3156480510","https://openalex.org/W4211195953","https://openalex.org/W4237256801","https://openalex.org/W4312247631"],"related_works":["https://openalex.org/W4238897586","https://openalex.org/W435179959","https://openalex.org/W2619091065","https://openalex.org/W2059640416","https://openalex.org/W1490753184","https://openalex.org/W2284465472","https://openalex.org/W2291782699","https://openalex.org/W1993948687","https://openalex.org/W2000169967","https://openalex.org/W2112883198"],"abstract_inverted_index":{"Automating":[0],"the":[1,8,22,36,82],"repair":[2,27,41,129,147],"of":[3,10,26,62,84,106,116],"vulnerabilities":[4,63],"is":[5,139],"emerging":[6],"in":[7,35,93,111],"field":[9],"software":[11,55],"security.":[12],"Previous":[13],"efforts":[14],"have":[15],"leveraged":[16],"Automated":[17],"Program":[18],"Repair":[19],"(APR)":[20],"for":[21,52,67,96,109,119,127,133],"task.":[23],"Reproducible":[24],"pipelines":[25],"tools":[28,66,92],"on":[29,89],"vulnerability":[30,56,128],"benchmarks":[31,61],"can":[32,142],"promote":[33],"advances":[34],"field,":[37],"such":[38],"as":[39],"new":[40],"techniques.":[42],"We":[43,80,122],"propose":[44],"Maestro,":[45],"a":[46,114],"decentralized":[47],"platform":[48,59,126],"with":[49,64,86,130,149],"RESTful":[50],"APIs":[51],"performing":[53,68],"automated":[54],"repair.":[57],"Our":[58,99],"connects":[60],"APR":[65,78,91],"controlled":[69],"experiments.":[70],"It":[71],"also":[72],"promotes":[73],"fair":[74],"comparisons":[75],"among":[76],"different":[77],"tools.":[79],"compare":[81],"performance":[83],"Maestro":[85,138],"previous":[87],"studies":[88],"four":[90],"finding":[94],"repairs":[95],"ten":[97],"projects.":[98,121],"execution":[100],"time":[101],"results":[102],"indicate":[103],"an":[104,124],"overhead":[105],"23":[107],"seconds":[108,118],"projects":[110],"C":[112,135],"and":[113,136,141,146],"reduction":[115],"14":[117],"Java":[120],"introduce":[123],"agnostic":[125],"preliminary":[131],"tools/datasets":[132],"both":[134],"Java.":[137],"modular":[140],"accommodate":[143],"tools,":[144],"benchmarks,":[145],"workflows":[148],"dedicated":[150],"plugins.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
