{"id":"https://openalex.org/W4388638461","doi":"https://doi.org/10.1145/3632746","title":"Vision Transformer Inspired Automated Vulnerability Repair","display_name":"Vision Transformer Inspired Automated Vulnerability Repair","publication_year":2023,"publication_date":"2023-11-13","ids":{"openalex":"https://openalex.org/W4388638461","doi":"https://doi.org/10.1145/3632746"},"language":"en","primary_location":{"id":"doi:10.1145/3632746","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3632746","pdf_url":null,"source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102710465","display_name":"Michael C. Fu","orcid":"https://orcid.org/0000-0001-7211-3491"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Michael Fu","raw_affiliation_strings":["Monash University, Clayton, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100769134","display_name":"Van Nguyen","orcid":"https://orcid.org/0000-0002-5838-3409"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Van Nguyen","raw_affiliation_strings":["Monash University, Clayton, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081449581","display_name":"Chakkrit Tantithamthavorn","orcid":"https://orcid.org/0000-0002-5516-9984"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chakkrit Tantithamthavorn","raw_affiliation_strings":["Monash University, Clayton, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036447132","display_name":"Dinh Phung","orcid":"https://orcid.org/0000-0002-9977-8247"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dinh Phung","raw_affiliation_strings":["Monash University, Clayton, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102780660","display_name":"Trung Le","orcid":"https://orcid.org/0000-0003-0414-9067"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Trung Le","raw_affiliation_strings":["Monash University, Clayton, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102710465"],"corresponding_institution_ids":["https://openalex.org/I56590836"],"apc_list":null,"apc_paid":null,"fwci":13.3895,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.98793873,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"33","issue":"3","first_page":"1","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8025577068328857},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7009193897247314},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.6276445388793945},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6007198095321655},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4940848648548126},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4529120922088623},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.4103221893310547},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3621918261051178},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10282883048057556},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08917978405952454},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08249297738075256}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8025577068328857},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7009193897247314},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.6276445388793945},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6007198095321655},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4940848648548126},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4529120922088623},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.4103221893310547},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3621918261051178},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10282883048057556},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08917978405952454},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08249297738075256},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3632746","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3632746","pdf_url":null,"source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W171406816","https://openalex.org/W2153579005","https://openalex.org/W2907705732","https://openalex.org/W2962784628","https://openalex.org/W2979183801","https://openalex.org/W2981852735","https://openalex.org/W2986396948","https://openalex.org/W3043761819","https://openalex.org/W3048065912","https://openalex.org/W3089621332","https://openalex.org/W3091588759","https://openalex.org/W3096609285","https://openalex.org/W3098605233","https://openalex.org/W3134686229","https://openalex.org/W3156480510","https://openalex.org/W3161027892","https://openalex.org/W3174220201","https://openalex.org/W3175995826","https://openalex.org/W3177116043","https://openalex.org/W3183469243","https://openalex.org/W3194346579","https://openalex.org/W3199263538","https://openalex.org/W3210162706","https://openalex.org/W4206241418","https://openalex.org/W4207068100","https://openalex.org/W4225640545","https://openalex.org/W4225673889","https://openalex.org/W4226169266","https://openalex.org/W4286331377","https://openalex.org/W4288089799","https://openalex.org/W4294170691","https://openalex.org/W4297847088","https://openalex.org/W4297899930","https://openalex.org/W4297900003","https://openalex.org/W4308641648","https://openalex.org/W4308643015","https://openalex.org/W4312436517","https://openalex.org/W4319988127","https://openalex.org/W4321524724","https://openalex.org/W4365799834","https://openalex.org/W4376606821","https://openalex.org/W4378713557","https://openalex.org/W4380551113","https://openalex.org/W4385187421","https://openalex.org/W4385884967","https://openalex.org/W4388826738","https://openalex.org/W6600339963","https://openalex.org/W6850201092"],"related_works":["https://openalex.org/W4390516098","https://openalex.org/W2181948922","https://openalex.org/W2384362569","https://openalex.org/W2142795561","https://openalex.org/W4205302943","https://openalex.org/W2561132942","https://openalex.org/W3155418658","https://openalex.org/W4243199227","https://openalex.org/W2379948177","https://openalex.org/W2334580170"],"abstract_inverted_index":{"Recently,":[0],"automated":[1,208],"vulnerability":[2,65,102,142,150,209,252],"repair":[3,56,66,171,210],"approaches":[4,40,74],"have":[5],"been":[6],"widely":[7],"adopted":[8],"to":[9,47,51,84,89,105,122,146,166,182,215],"combat":[10],"increasing":[11],"software":[12,243,258],"security":[13],"issues.":[14],"In":[15,58,115,173],"particular,":[16,116],"transformer-based":[17],"encoder-decoder":[18],"models":[19,265],"achieve":[20,123],"competitive":[21],"results.":[22],"Whereas":[23],"vulnerable":[24,32,52,107,131,167,188],"programs":[25],"may":[26],"only":[27],"consist":[28],"of":[29,190,206,220,224,231,250,257],"a":[30,42,63,148,191],"few":[31],"code":[33,53,108,132,168,262],"areas":[34,54,109,169,189],"that":[35,185],"need":[36],"repair,":[37],"existing":[38],"AVR":[39],"lack":[41],"mechanism":[43,121],"guiding":[44],"their":[45,113,129],"model":[46],"pay":[48,163],"more":[49,140,164],"attention":[50,165],"during":[55,170],"generation.":[57,172],"this":[59],"article,":[60],"we":[61,98,117,144,175],"propose":[62,145],"novel":[64,149],"framework":[67],"inspired":[68],"by":[69,213],"the":[70,79,85,119,124,187,198,207,221,228,246,255],"Vision":[71],"Transformer":[72],"based":[73],"for":[75],"object":[76,86,93],"detection":[77,94],"in":[78,92,95,254],"computer":[80,96],"vision":[81],"domain.":[82],"Similar":[83],"queries":[87,103],"used":[88],"locate":[90,106],"objects":[91],"vision,":[97],"introduce":[99],"and":[100,110,128,138,153,234,248,263],"leverage":[101,118],"(VQs)":[104],"then":[111],"suggest":[112],"repairs.":[114],"cross-attention":[120,222],"cross-match":[125,137],"between":[126],"VQs":[127,162],"corresponding":[130],"areas.":[133],"To":[134],"strengthen":[135],"our":[136,161,177,202,218,225,232,238],"generate":[139],"accurate":[141],"repairs,":[143],"learn":[147,183],"mask":[151],"(VM)":[152],"integrate":[154],"it":[155],"into":[156,179],"decoders\u2019":[157],"cross-attention,":[158],"which":[159],"makes":[160],"addition,":[174],"incorporate":[176],"VM":[178,233],"encoders\u2019":[180],"self-attention":[181],"embeddings":[184],"emphasize":[186],"program.":[192],"Through":[193],"an":[194],"extensive":[195],"evaluation":[196],"using":[197],"real-world":[199],"5,417":[200],"vulnerabilities,":[201],"approach":[203,226],"outperforms":[204],"all":[205],"baseline":[211],"methods":[212],"2.68%":[214],"32.33%.":[216],"Additionally,":[217],"analysis":[219],"map":[223],"confirms":[227],"design":[229],"rationale":[230],"its":[235],"effectiveness.":[236],"Finally,":[237],"survey":[239],"study":[240],"with":[241],"71":[242],"practitioners":[244],"highlights":[245],"significance":[247],"usefulness":[249],"AI-generated":[251],"repairs":[253],"realm":[256],"security.":[259],"The":[260],"training":[261],"pre-trained":[264],"are":[266],"available":[267],"at":[268],"https://github.com/awsm-research/VQM.":[269]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":9}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
