{"id":"https://openalex.org/W4378942602","doi":"https://doi.org/10.1145/3597926.3598135","title":"How Effective Are Neural Networks for Fixing Security Vulnerabilities","display_name":"How Effective Are Neural Networks for Fixing Security Vulnerabilities","publication_year":2023,"publication_date":"2023-07-12","ids":{"openalex":"https://openalex.org/W4378942602","doi":"https://doi.org/10.1145/3597926.3598135"},"language":"en","primary_location":{"id":"doi:10.1145/3597926.3598135","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3597926.3598135","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3597926.3598135","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073986426","display_name":"Yi Wu","orcid":"https://orcid.org/0009-0006-3120-3769"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yi Wu","raw_affiliation_strings":["Purdue University, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101948829","display_name":"Nan Jiang","orcid":"https://orcid.org/0000-0001-8518-2576"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nan Jiang","raw_affiliation_strings":["Purdue University, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002648627","display_name":"Hung Viet Pham","orcid":"https://orcid.org/0000-0002-1769-8527"},"institutions":[{"id":"https://openalex.org/I192455969","display_name":"York University","ror":"https://ror.org/05fq50484","country_code":"CA","type":"education","lineage":["https://openalex.org/I192455969"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hung Viet Pham","raw_affiliation_strings":["York University, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"York University, Canada","institution_ids":["https://openalex.org/I192455969"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063985157","display_name":"Thibaud Lutellier","orcid":"https://orcid.org/0000-0002-1823-0061"},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Thibaud Lutellier","raw_affiliation_strings":["University of Alberta, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Alberta, Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102518310","display_name":"Jordan Davis","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jordan Davis","raw_affiliation_strings":["Purdue University, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009306083","display_name":"Lin Tan","orcid":"https://orcid.org/0000-0002-9400-1754"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lin Tan","raw_affiliation_strings":["Purdue University, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010619241","display_name":"Petr Babkin","orcid":"https://orcid.org/0009-0004-2737-9820"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Petr Babkin","raw_affiliation_strings":["J.P. Morgan AI Research, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"J.P. Morgan AI Research, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087647155","display_name":"Sameena Shah","orcid":"https://orcid.org/0009-0000-5960-5811"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sameena Shah","raw_affiliation_strings":["J.P. Morgan AI Research, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"J.P. Morgan AI Research, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5073986426"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":17.6192,"has_fulltext":true,"cited_by_count":85,"citation_normalized_percentile":{"value":0.99481441,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1282","last_page":"1294"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8012039661407471},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5872588157653809},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5872038006782532},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5835352540016174},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5619126558303833},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.5418158173561096},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5023443698883057},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5003814697265625},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.435698926448822},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.42957401275634766},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.4156484603881836},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.4113016128540039},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.40098345279693604},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.38605594635009766},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30137085914611816},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.19159194827079773},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12082374095916748},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.09530344605445862}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8012039661407471},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5872588157653809},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5872038006782532},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5835352540016174},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5619126558303833},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.5418158173561096},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5023443698883057},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5003814697265625},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.435698926448822},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.42957401275634766},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.4156484603881836},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.4113016128540039},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.40098345279693604},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.38605594635009766},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30137085914611816},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.19159194827079773},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12082374095916748},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.09530344605445862},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3597926.3598135","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3597926.3598135","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2305.18607","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2305.18607","pdf_url":"https://arxiv.org/pdf/2305.18607","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3597926.3598135","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3597926.3598135","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1174061045","display_name":null,"funder_award_id":"2006688","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5174186738","display_name":null,"funder_award_id":"1901242,2006688","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7284570364","display_name":null,"funder_award_id":"1901242","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":71,"referenced_works":["https://openalex.org/W23405769","https://openalex.org/W2025411198","https://openalex.org/W2031508806","https://openalex.org/W2097174997","https://openalex.org/W2099866050","https://openalex.org/W2156723666","https://openalex.org/W2400329213","https://openalex.org/W2600390930","https://openalex.org/W2747329762","https://openalex.org/W2762550985","https://openalex.org/W2795212651","https://openalex.org/W2883977877","https://openalex.org/W2885373340","https://openalex.org/W2898887472","https://openalex.org/W2907705732","https://openalex.org/W2912218663","https://openalex.org/W2950571912","https://openalex.org/W2963926786","https://openalex.org/W2974889942","https://openalex.org/W2980012492","https://openalex.org/W2996248296","https://openalex.org/W3043761819","https://openalex.org/W3091588759","https://openalex.org/W3098605233","https://openalex.org/W3100191342","https://openalex.org/W3102072242","https://openalex.org/W3119507053","https://openalex.org/W3134686229","https://openalex.org/W3156480510","https://openalex.org/W3160155705","https://openalex.org/W3161027892","https://openalex.org/W3161282429","https://openalex.org/W3170092793","https://openalex.org/W3174220201","https://openalex.org/W3177813494","https://openalex.org/W3183469243","https://openalex.org/W3193682477","https://openalex.org/W3195703954","https://openalex.org/W3198685994","https://openalex.org/W3205186298","https://openalex.org/W3212496002","https://openalex.org/W4211263275","https://openalex.org/W4213241976","https://openalex.org/W4224060952","https://openalex.org/W4225411436","https://openalex.org/W4226155321","https://openalex.org/W4226485558","https://openalex.org/W4231328940","https://openalex.org/W4236586490","https://openalex.org/W4237256801","https://openalex.org/W4248799824","https://openalex.org/W4281567711","https://openalex.org/W4282830668","https://openalex.org/W4284674057","https://openalex.org/W4285490396","https://openalex.org/W4288048330","https://openalex.org/W4288089799","https://openalex.org/W4292779060","https://openalex.org/W4297666478","https://openalex.org/W4297824267","https://openalex.org/W4307412413","https://openalex.org/W4312247631","https://openalex.org/W4320339608","https://openalex.org/W4365806382","https://openalex.org/W4367672983","https://openalex.org/W4384304728","https://openalex.org/W4384345778","https://openalex.org/W4384347367","https://openalex.org/W4385187279","https://openalex.org/W4385245566","https://openalex.org/W4386982649"],"related_works":["https://openalex.org/W2141388993","https://openalex.org/W1978034799","https://openalex.org/W2999607548","https://openalex.org/W2292865721","https://openalex.org/W4319165526","https://openalex.org/W2956597637","https://openalex.org/W2044639210","https://openalex.org/W2293245356","https://openalex.org/W4225160120","https://openalex.org/W2469491375"],"abstract_inverted_index":{"Security":[0],"vulnerability":[1],"repair":[2,44],"is":[3,8],"a":[4],"difficult":[5],"task":[6],"that":[7,27,47],"in":[9],"dire":[10],"need":[11],"of":[12,16],"automation.":[13],"Two":[14],"groups":[15],"techniques":[17,46],"have":[18,28],"shown":[19],"promise:":[20],"(1)":[21],"large":[22],"code":[23,33,38],"language":[24],"models":[25,52],"(LLMs)":[26],"been":[29],"pre-trained":[30],"on":[31],"source":[32],"for":[34],"tasks":[35],"such":[36],"as":[37],"completion,":[39],"and":[40],"(2)":[41],"automated":[42],"program":[43],"(APR)":[45],"use":[48],"deep":[49],"learning":[50],"(DL)":[51],"to":[53],"automatically":[54],"fix":[55],"software":[56],"bugs.":[57]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":42},{"year":2024,"cited_by_count":32},{"year":2023,"cited_by_count":5}],"updated_date":"2026-05-22T09:01:20.584952","created_date":"2025-10-10T00:00:00"}
