{"id":"https://openalex.org/W4405181871","doi":"https://doi.org/10.1145/3658644.3691374","title":"Poster: An Exploration of Large Language Models in Malicious Source Code Detection","display_name":"Poster: An Exploration of Large Language Models in Malicious Source Code Detection","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405181871","doi":"https://doi.org/10.1145/3658644.3691374"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3691374","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691374","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691374","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691374","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115060491","display_name":"Di Xue","orcid":null},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Di Xue","raw_affiliation_strings":["Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"],"raw_orcid":"https://orcid.org/0009-0005-2324-0239","affiliations":[{"raw_affiliation_string":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115060492","display_name":"Gang Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Zhao","raw_affiliation_strings":["Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"],"raw_orcid":"https://orcid.org/0009-0004-5143-9272","affiliations":[{"raw_affiliation_string":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115060493","display_name":"Zhongqi Fan","orcid":"https://orcid.org/0009-0005-2947-1564"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongqi Fan","raw_affiliation_strings":["Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"],"raw_orcid":"https://orcid.org/0009-0005-2947-1564","affiliations":[{"raw_affiliation_string":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115060494","display_name":"Wei Li","orcid":null},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Li","raw_affiliation_strings":["Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"],"raw_orcid":"https://orcid.org/0009-0002-4073-0801","affiliations":[{"raw_affiliation_string":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115060495","display_name":"Yahong Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yahong Xu","raw_affiliation_strings":["Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"],"raw_orcid":"https://orcid.org/0009-0005-3772-3282","affiliations":[{"raw_affiliation_string":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115060496","display_name":"Zhen Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Liu","raw_affiliation_strings":["Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"],"raw_orcid":"https://orcid.org/0009-0008-7119-8516","affiliations":[{"raw_affiliation_string":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115060497","display_name":"Yin Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yin Liu","raw_affiliation_strings":["Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"],"raw_orcid":"https://orcid.org/0009-0001-9549-7042","affiliations":[{"raw_affiliation_string":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115060498","display_name":"Zhongliang Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongliang Yuan","raw_affiliation_strings":["Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"],"raw_orcid":"https://orcid.org/0009-0001-0541-7505","affiliations":[{"raw_affiliation_string":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250955327"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5115060491"],"corresponding_institution_ids":["https://openalex.org/I2250955327"],"apc_list":null,"apc_paid":null,"fwci":0.6576,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.69649579,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"4940","last_page":"4942"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.8417819142341614},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7758591175079346},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6257576942443848},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.4954270124435425},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4624834656715393},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45615991950035095},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4399358034133911},{"id":"https://openalex.org/keywords/word-embedding","display_name":"Word embedding","score":0.43857550621032715},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41583701968193054},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4041982889175415},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3306499421596527},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.20616638660430908},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18533244729042053}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.8417819142341614},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7758591175079346},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6257576942443848},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.4954270124435425},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4624834656715393},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45615991950035095},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4399358034133911},{"id":"https://openalex.org/C2777462759","wikidata":"https://www.wikidata.org/wiki/Q18395344","display_name":"Word embedding","level":3,"score":0.43857550621032715},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41583701968193054},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4041982889175415},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3306499421596527},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.20616638660430908},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18533244729042053},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3691374","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691374","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691374","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3691374","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691374","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691374","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405181871.pdf","grobid_xml":"https://content.openalex.org/works/W4405181871.grobid-xml"},"referenced_works_count":6,"referenced_works":["https://openalex.org/W3217564040","https://openalex.org/W4292779060","https://openalex.org/W4392353733","https://openalex.org/W4401042136","https://openalex.org/W6778883912","https://openalex.org/W6855007681"],"related_works":["https://openalex.org/W2905433371","https://openalex.org/W2888392564","https://openalex.org/W4310278675","https://openalex.org/W4388422664","https://openalex.org/W4390569940","https://openalex.org/W4361193272","https://openalex.org/W2963326959","https://openalex.org/W4388685194","https://openalex.org/W3081644756","https://openalex.org/W2942293597"],"abstract_inverted_index":{"Embedding":[0],"malicious":[1,22,42,71,86],"code":[2,43,73,88],"within":[3],"the":[4,14,49,58,75,84,102,112,117,120,122,134],"software":[5,76],"supply":[6,77],"chain":[7],"has":[8],"become":[9],"a":[10,40,90],"significant":[11],"concern":[12],"in":[13,74,119],"information":[15],"technology":[16],"field.":[17],"Current":[18],"methods":[19,131],"for":[20],"detecting":[21],"code,":[23],"based":[24],"on":[25],"signatures,":[26],"behavior":[27],"analysis,":[28],"and":[29,57,82,96,114,126,129],"traditional":[30,53,63],"machine":[31,54,64],"learning":[32,55,65],"models,":[33],"lack":[34],"result":[35],"interpretability.":[36],"This":[37],"study":[38],"proposes":[39],"novel":[41],"detection":[44],"framework,":[45,121],"Mal-LLM,":[46],"which":[47],"leverages":[48],"cost":[50,135],"advantages":[51],"of":[52,60,70,101,116,124,136],"models":[56,66],"interpretability":[59],"LLMs.":[61],"Initially,":[62],"filter":[67],"vast":[68],"amounts":[69],"source":[72,87],"chain.":[78],"Subsequently,":[79],"LLMs":[80,138],"analyze":[81],"interpret":[83],"filtered":[85],"using":[89,137],"customized":[91],"prompt":[92],"template":[93],"incorporating":[94],"role-playing":[95],"chain-of-thought":[97],"techniques.":[98],"The":[99],"feasibility":[100],"Mal-LLM":[103],"framework":[104],"is":[105],"validated":[106],"through":[107],"extensive":[108],"experimental":[109],"analyses,":[110],"examining":[111],"ambiguity":[113],"redundancy":[115],"LLM":[118],"significance":[123],"''experience''":[125],"''malicious''":[127],"prompts,":[128],"exploring":[130],"to":[132],"reduce":[133],"from":[139],"an":[140],"enterprise":[141],"perspective.":[142]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
