{"id":"https://openalex.org/W4404515021","doi":"https://doi.org/10.1145/3689217.3690622","title":"How to Efficiently Manage Critical Infrastructure Vulnerabilities? Toward Large Code-graph Models","display_name":"How to Efficiently Manage Critical Infrastructure Vulnerabilities? Toward Large Code-graph Models","publication_year":2023,"publication_date":"2023-11-19","ids":{"openalex":"https://openalex.org/W4404515021","doi":"https://doi.org/10.1145/3689217.3690622"},"language":"en","primary_location":{"id":"doi:10.1145/3689217.3690622","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3689217.3690622","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3689217.3690622","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Hongying Zhang","orcid":"https://orcid.org/0009-0008-2496-1865"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongying Zhang","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai Shi, China"],"raw_orcid":"https://orcid.org/0009-0008-2496-1865","affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai Shi, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007267530","display_name":"Gaolei Li","orcid":"https://orcid.org/0000-0003-3913-5001"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaolei Li","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai Shi, China"],"raw_orcid":"https://orcid.org/0000-0003-3913-5001","affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai Shi, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100673372","display_name":"Shenghong Li","orcid":"https://orcid.org/0000-0002-0767-2307"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shenghong Li","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai Shi, China"],"raw_orcid":"https://orcid.org/0000-0002-0767-2307","affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai Shi, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101987911","display_name":"Hongfu Liu","orcid":"https://orcid.org/0000-0002-3543-9916"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongfu Liu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai Shi, China"],"raw_orcid":"https://orcid.org/0000-0002-3543-9916","affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai Shi, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400133","display_name":"Shuo Wang","orcid":"https://orcid.org/0000-0001-8938-2364"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuo Wang","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai Shi, China"],"raw_orcid":"https://orcid.org/0000-0001-8938-2364","affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai Shi, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100391361","display_name":"Jianhua Li","orcid":"https://orcid.org/0000-0002-6831-3973"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Li","raw_affiliation_strings":["Shanghai JiaoTong University, Shanghai Shi, China"],"raw_orcid":"https://orcid.org/0000-0002-6831-3973","affiliations":[{"raw_affiliation_string":"Shanghai JiaoTong University, Shanghai Shi, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26648427,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7082947492599487},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.644302487373352},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.44705313444137573},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.440830796957016},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3677138388156891},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.36698222160339355},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3080219328403473}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7082947492599487},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.644302487373352},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.44705313444137573},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.440830796957016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3677138388156891},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.36698222160339355},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3080219328403473},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3689217.3690622","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3689217.3690622","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3689217.3690622","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3689217.3690622","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2130758759","https://openalex.org/W2182787334","https://openalex.org/W3156480510","https://openalex.org/W3166095789","https://openalex.org/W3182763642","https://openalex.org/W4225658316","https://openalex.org/W4285205054","https://openalex.org/W4285581227","https://openalex.org/W4308641648","https://openalex.org/W4378591002","https://openalex.org/W4382239980","https://openalex.org/W4384345641","https://openalex.org/W4384345748","https://openalex.org/W4385187421","https://openalex.org/W4385571596","https://openalex.org/W4385884967","https://openalex.org/W4387298393","https://openalex.org/W4387891144","https://openalex.org/W4388483136","https://openalex.org/W4388886678","https://openalex.org/W4389158474","https://openalex.org/W4389162688","https://openalex.org/W4391174792","https://openalex.org/W4394769544","https://openalex.org/W4394769548","https://openalex.org/W4400975288","https://openalex.org/W4401537488"],"related_works":["https://openalex.org/W2963077982","https://openalex.org/W2184280487","https://openalex.org/W3108402314","https://openalex.org/W4313317452","https://openalex.org/W4230475103","https://openalex.org/W2897362009","https://openalex.org/W4386971846","https://openalex.org/W3004302778","https://openalex.org/W578380379","https://openalex.org/W2473651304"],"abstract_inverted_index":{"Critical":[0],"infrastructure":[1],"vulnerabilities,":[2],"once":[3],"maliciously":[4],"manipulated,":[5],"may":[6],"cause":[7],"serious":[8],"security":[9],"accidents.":[10],"However,":[11],"existing":[12],"methods":[13],"are":[14],"always":[15],"unable":[16],"to":[17,59,67,87],"discover,":[18],"assess,":[19],"block":[20],"and":[21,29,54,83,127],"repair":[22],"those":[23],"unknown/known":[24],"vulnerabilities":[25],"in":[26,109],"a":[27,61,117,139],"timely":[28],"effective":[30],"manner.":[31],"This":[32],"article":[33],"explores":[34],"the":[35,102,110,130,144,150],"potential":[36],"of":[37,121,152],"large":[38,85],"models":[39,86,126],"on":[40],"vulnerability":[41,48,70,111],"management":[42,49,72],"optimization.":[43],"To":[44],"efficiently":[45],"orchestrate":[46],"complex":[47],"tasks":[50],"(e.g.,":[51],"detection,":[52],"prioritization,":[53],"code":[55],"repairing),":[56],"we":[57,96],"propose":[58],"conduct":[60,97],"novel":[62],"Large":[63],"Code-graph":[64],"Model":[65],"(LCM)":[66],"break":[68],"down":[69],"life-cycle":[71],"into":[73],"distinct":[74],"suites":[75],"using":[76],"artificial":[77],"intelligence":[78],"agents,":[79],"Retrieval-Augmented":[80],"Generation":[81],"(RAG),":[82],"graph-structured":[84],"automate":[88],"processes":[89],"without":[90],"extensive":[91],"prior":[92],"knowledge.":[93],"In":[94],"particular,":[95],"an":[98],"evaluation":[99],"experiment":[100],"utilizing":[101],"proposed":[103,131,154],"LCM":[104,132],"for":[105],"pre-processing":[106,141],"vulnerable":[107],"data":[108,140],"detection":[112,119],"suite.":[113],"The":[114],"results":[115,146],"showed":[116],"final":[118],"accuracy":[120],"97.2%,":[122],"significantly":[123],"outperforming":[124],"baseline":[125],"confirming":[128],"that":[129],"can":[133],"autonomously":[134],"extract":[135],"superior":[136],"features":[137],"as":[138],"tool.":[142],"Consequently,":[143],"experimental":[145],"also":[147],"partially":[148],"validate":[149],"feasibility":[151],"our":[153],"framework.":[155]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
