{"id":"https://openalex.org/W7133306968","doi":"https://doi.org/10.48550/arxiv.2603.01494","title":"Inference-Time Safety For Code LLMs Via Retrieval-Augmented Revision","display_name":"Inference-Time Safety For Code LLMs Via Retrieval-Augmented Revision","publication_year":2026,"publication_date":"2026-03-02","ids":{"openalex":"https://openalex.org/W7133306968","doi":"https://doi.org/10.48550/arxiv.2603.01494"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.01494","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.01494","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.01494","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055342360","display_name":"Manisha Mukherjee","orcid":"https://orcid.org/0000-0001-6312-1094"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mukherjee, Manisha","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5127903819","display_name":"Vincent J. Hellendoorn","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hellendoorn, Vincent J.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055342360"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.37380000948905945,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.37380000948905945,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.13019999861717224,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.0731000006198883,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5418000221252441},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5210000276565552},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.4936000108718872},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.484499990940094},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.4422000050544739},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.43380001187324524},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.42340001463890076},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.36480000615119934},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.3587000072002411}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7178999781608582},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.640500009059906},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5418000221252441},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5210000276565552},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.4936000108718872},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.484499990940094},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.4422000050544739},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.43380001187324524},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.42340001463890076},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.37860000133514404},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.36480000615119934},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3587000072002411},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.35280001163482666},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.3508000075817108},{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.3395000100135803},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3361999988555908},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3237000107765198},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.31290000677108765},{"id":"https://openalex.org/C2780665704","wikidata":"https://www.wikidata.org/wiki/Q959298","display_name":"Intervention (counseling)","level":2,"score":0.30550000071525574},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.3046000003814697},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.30300000309944153},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.29339998960494995},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.29269999265670776},{"id":"https://openalex.org/C149071572","wikidata":"https://www.wikidata.org/wiki/Q1035664","display_name":"Card security code","level":4,"score":0.2874000072479248},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.28529998660087585},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.27549999952316284},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.26100000739097595},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.2581000030040741}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.01494","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.01494","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.01494","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.01494","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6378677487373352,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Large":[0],"Language":[1],"Models":[2,31],"(LLMs)":[3],"are":[4,101],"increasingly":[5],"deployed":[6],"for":[7,195],"code":[8,64,87,109,151,166,201],"generation":[9,53,65,79],"in":[10,18,85,126,211],"high-stakes":[11],"software":[12],"development,":[13],"yet":[14],"their":[15],"limited":[16],"transparency":[17],"security":[19,45,83,91,137,163],"reasoning":[20],"and":[21,88,142,156,203],"brittleness":[22],"to":[23,39,50,62,80,104,117,135,168],"evolving":[24,136],"vulnerability":[25],"patterns":[26],"raise":[27],"critical":[28],"trustworthiness":[29],"concerns.":[30],"trained":[32],"on":[33],"static":[34,179],"datasets":[35],"cannot":[36],"readily":[37],"adapt":[38],"newly":[40],"discovered":[41],"vulnerabilities":[42,175],"or":[43],"changing":[44],"standards":[46],"without":[47,139],"retraining,":[48],"leading":[49],"the":[51,162,197,205],"repeated":[52],"of":[54,164,199,208],"unsafe":[55,150],"code.":[56],"We":[57],"present":[58],"a":[59,94,192],"principled":[60],"approach":[61,76,160],"trustworthy":[63,213],"by":[66,132,178],"design":[67,112],"that":[68,184],"operates":[69],"as":[70,176,191],"an":[71,106],"inference-time":[72,187],"safety":[73,123,144,198],"mechanism.":[74],"Our":[75],"employs":[77],"retrieval-augmented":[78,186],"surface":[81],"relevant":[82,116],"risks":[84],"generated":[86],"retrieve":[89],"related":[90],"discussions":[92],"from":[93],"curated":[95],"Stack":[96],"Overflow":[97],"knowledge":[98,210],"base,":[99],"which":[100],"then":[102],"used":[103],"guide":[105],"LLM":[107],"during":[108],"revision.":[110],"This":[111],"emphasizes":[113],"three":[114],"aspects":[115],"trustworthiness:":[118],"(1)":[119],"interpretability,":[120],"through":[121,146],"transparent":[122],"interventions":[124,188],"grounded":[125],"expert":[127],"community":[128,209],"explanations;":[129],"(2)":[130],"robustness,":[131],"allowing":[133],"adaptation":[134],"practices":[138],"model":[140],"retraining;":[141],"(3)":[143],"alignment,":[145],"real-time":[147],"intervention":[148],"before":[149],"reaches":[152],"deployment.":[153,215],"Across":[154],"real-world":[155],"benchmark":[157],"datasets,":[158],"our":[159],"improves":[161],"LLM-generated":[165],"compared":[167],"prompting":[169],"alone,":[170],"while":[171],"introducing":[172],"no":[173],"new":[174],"measured":[177],"analysis.":[180],"These":[181],"results":[182],"suggest":[183],"principled,":[185],"can":[189],"serve":[190],"complementary":[193],"mechanism":[194],"improving":[196],"LLM-based":[200],"generation,":[202],"highlight":[204],"ongoing":[206],"value":[207],"supporting":[212],"AI":[214]},"counts_by_year":[],"updated_date":"2026-03-04T07:09:34.246503","created_date":"2026-03-04T00:00:00"}
