{"id":"https://openalex.org/W4403520202","doi":"https://doi.org/10.1145/3691620.3694982","title":"PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code","display_name":"PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code","publication_year":2024,"publication_date":"2024-10-18","ids":{"openalex":"https://openalex.org/W4403520202","doi":"https://doi.org/10.1145/3691620.3694982"},"language":"en","primary_location":{"id":"doi:10.1145/3691620.3694982","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3691620.3694982","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3691620.3694982","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011906857","display_name":"Ziyou Jiang","orcid":"https://orcid.org/0000-0003-1182-143X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ziyou Jiang","raw_affiliation_strings":["State Key Laboratory of Intelligent Game, Science and Technology on Integrated Information System Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, China","University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Intelligent Game, Science and Technology on Integrated Information System Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014381743","display_name":"Lin Shi","orcid":"https://orcid.org/0000-0003-1476-7213"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Shi","raw_affiliation_strings":["School of Software, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039642499","display_name":"Guowei Yang","orcid":"https://orcid.org/0000-0002-1404-4560"},"institutions":[{"id":"https://openalex.org/I165143802","display_name":"The University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Guowei Yang","raw_affiliation_strings":["University of Queensland, Brisbane, Queensland, Australia"],"affiliations":[{"raw_affiliation_string":"University of Queensland, Brisbane, Queensland, Australia","institution_ids":["https://openalex.org/I165143802"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100434820","display_name":"Qing Wang","orcid":"https://orcid.org/0000-0002-2618-5694"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing Wang","raw_affiliation_strings":["State Key Laboratory of Intelligent Game, Science and Technology on Integrated Information System Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, China","University of Chinese Academy of Sciences, Beijing, Select one..., China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Intelligent Game, Science and Technology on Integrated Information System Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, Select one..., China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011906857"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20293791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10215","display_name":"Semantic Web and Ontologies","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7556567192077637},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.637343168258667},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5798103213310242},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3833862841129303},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32167744636535645}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7556567192077637},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.637343168258667},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5798103213310242},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3833862841129303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32167744636535645},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3691620.3694982","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3691620.3694982","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3691620.3694982","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3691620.3694982","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1581568102","display_name":null,"funder_award_id":"62072442","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3456977075","display_name":null,"funder_award_id":"62332001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5717671410","display_name":null,"funder_award_id":"62272445","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6800602771","display_name":null,"funder_award_id":"62232016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1553724776","https://openalex.org/W1969967043","https://openalex.org/W2002892925","https://openalex.org/W2026750231","https://openalex.org/W2028820179","https://openalex.org/W2043811931","https://openalex.org/W2043837581","https://openalex.org/W2065890363","https://openalex.org/W2079753286","https://openalex.org/W2101726875","https://openalex.org/W2146649871","https://openalex.org/W2484621096","https://openalex.org/W2487875201","https://openalex.org/W2511548333","https://openalex.org/W2748690817","https://openalex.org/W2765858138","https://openalex.org/W2781021471","https://openalex.org/W2794605395","https://openalex.org/W2885030880","https://openalex.org/W2947803146","https://openalex.org/W2962931396","https://openalex.org/W2991305803","https://openalex.org/W3000617142","https://openalex.org/W3031251962","https://openalex.org/W3033777149","https://openalex.org/W3043761819","https://openalex.org/W3098267758","https://openalex.org/W3100992758","https://openalex.org/W3124371174","https://openalex.org/W3125205154","https://openalex.org/W3137815000","https://openalex.org/W3145506869","https://openalex.org/W3153451655","https://openalex.org/W3156556445","https://openalex.org/W3163206498","https://openalex.org/W3168865857","https://openalex.org/W3176465319","https://openalex.org/W3193682477","https://openalex.org/W3201342367","https://openalex.org/W4285821122","https://openalex.org/W4310276499","https://openalex.org/W4385567149","https://openalex.org/W4386214355","https://openalex.org/W4390897855","https://openalex.org/W4399213650","https://openalex.org/W6939822844"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Security":[0],"patches":[1,98],"are":[2,19],"essential":[3],"for":[4,36,146,253,288],"enhancing":[5],"the":[6,13,61,74,78,96,101,109,137,148,162,166,179,199,205,224,229,265,271,274,290],"stability":[7],"and":[8,32,50,70,95,107,153,194,227,236],"robustness":[9],"of":[10,92,165,191,207,261,267,273],"projects":[11],"in":[12,77,151,178,241],"open-source":[14],"software":[15],"community.":[16],"While":[17],"vulnerabilities":[18,29,149],"officially":[20],"expected":[21],"to":[22,56,84,104,122,135,142,249],"be":[23,67],"patched":[24],"before":[25],"being":[26],"disclosed,":[27],"patching":[28,289],"is":[30],"complicated":[31],"remains":[33],"a":[34],"struggle":[35],"many":[37],"organizations.":[38],"To":[39,203],"patch":[40,124,156,242,251,275],"vulnerabilities,":[41],"security":[42,102],"practitioners":[43,71],"typically":[44],"track":[45,73],"vulnerable":[46,171,214,257],"issue":[47],"reports":[48],"(IRs),":[49],"analyze":[51],"their":[52,82],"relevant":[53,62],"insecure":[54,63,75,93,111,130],"code":[55,64,76,94],"generate":[57,85,250],"potential":[58,176],"patches.":[59,86],"However,":[60],"may":[65],"not":[66],"explicitly":[68],"specified":[69],"cannot":[72],"repositories,":[79],"thus":[80],"limiting":[81],"ability":[83],"In":[87,113],"such":[88],"cases,":[89],"providing":[90],"examples":[91,125,252,276,287],"corresponding":[97],"would":[99],"benefit":[100,284],"developers":[103],"better":[105],"locate":[106],"resolve":[108],"actual":[110],"code.":[112,131],"this":[114],"paper,":[115],"we":[116,209],"propose":[117],"PatUntrack,":[118,208,279],"an":[119],"automated":[120],"approach":[121],"generating":[123,154],"from":[126,170,264,285],"IRs":[127,152,269],"without":[128],"tracked":[129],"PatUntrack":[132,221,246],"utilizes":[133],"auto-prompting":[134],"optimize":[136],"Large":[138],"Language":[139],"Model":[140],"(LLM)":[141],"make":[143],"it":[144,159,174,187],"applicable":[145],"analyzing":[147],"described":[150],"appropriate":[155],"examples.":[157],"Specifically,":[158],"first":[160],"generates":[161,188],"completed":[163],"description":[164,181],"Vulnerability-Triggering":[167],"Path":[168],"(VTP)":[169],"IRs.":[172,215,258],"Then,":[173],"corrects":[175],"hallucinations":[177],"VTP":[180,201],"with":[182],"external":[183],"golden":[184],"knowledge.":[185],"Finally,":[186],"Top-K":[189],"pairs":[190],"Insecure":[192],"Code":[193],"Patch":[195],"Example":[196],"based":[197],"on":[198,212,239],"corrected":[200],"description.":[202],"evaluate":[204],"performance":[206,226],"conducted":[210],"experiments":[211],"5,465":[213],"The":[216],"experimental":[217],"results":[218],"show":[219],"that":[220,281],"can":[222,283],"obtain":[223],"highest":[225],"improve":[228],"traditional":[230],"LLM":[231],"baselines":[232],"by":[233,278],"+17.7%":[234],"(MatchFix)":[235],"+14.6%":[237],"(Fix@10)":[238],"average":[240],"example":[243],"generation.":[244],"Furthermore,":[245],"was":[247],"applied":[248],"76":[254],"newly":[255],"disclosed":[256],"27":[259],"out":[260],"37":[262],"replies":[263],"authors":[266],"these":[268,286],"confirmed":[270],"usefulness":[272],"generated":[277],"indicating":[280],"they":[282],"vulnerabilities.":[291]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
