{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T07:16:25Z","timestamp":1778742985104,"version":"3.51.4"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928857","type":"print"},{"value":"9783031928864","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92886-4_8","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:16Z","timestamp":1747289596000},"page":"111-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["You Still have to\u00a0Study On the\u00a0Security of\u00a0LLM Generated Code"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Schaad","sequence":"first","affiliation":[]},{"given":"Stefan","family":"G\u00f6tz","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Binder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"8_CR1","unstructured":"Alshahwan, N., et al.: Automated unit test improvement using large language models at meta (2024). https:\/\/arxiv.org\/abs\/2402.09171"},{"key":"8_CR2","unstructured":"AWS: Amazon codewhisperer - faq (2023). https:\/\/aws.amazon.com\/de\/codewhisperer\/faqs\/. Accessed 18 Dec 2023"},{"issue":"02","key":"8_CR3","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MS.2023.3339934","volume":"41","author":"M Borg","year":"2024","unstructured":"Borg, M.: Requirements engineering and large language models: insights from a panel. IEEE Softw. 41(02), 6\u201310 (2024). https:\/\/doi.org\/10.1109\/MS.2023.3339934","journal-title":"IEEE Softw."},{"key":"8_CR4","unstructured":"Butterworth, J., et al.: Cwe top 25 most dangerous software weaknesses (2023). https:\/\/cwe.mitre.org\/top25\/index.html. Accessed 14 Dec 2023"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Cambaz, D., Zhang, X.: Use of AI-driven code generation models in teaching and learning programming: a systematic literature review. In: Proceedings of the 55th ACM Technical Symposium on Computer Science Education, vol. 1, pp. 172\u2013178. SIGCSE 2024, Association for Computing Machinery, New York (2024). https:\/\/doi.org\/10.1145\/3626252.3630958. https:\/\/doi.org\/10.1145\/3626252.3630958","DOI":"10.1145\/3626252.3630958"},{"key":"8_CR6","unstructured":"Chen, M., et al.: Evaluating large language models trained on code (2021). CoRR abs\/2107.03374 https:\/\/arxiv.org\/abs\/2107.03374"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Das, S., Deb, N., Cortesi, A., Chaki, N.: Zero-shot learning for named entity recognition in software specification documents, pp. 100\u2013110 (2023). https:\/\/doi.org\/10.1109\/RE57278.2023.00019","DOI":"10.1109\/RE57278.2023.00019"},{"key":"8_CR8","unstructured":"Deepmind, G.: Welcome to the gemini era (2023). https:\/\/deepmind.google\/technologies\/gemini\/#capabilities. Accessed 18 Dec 2023"},{"key":"8_CR9","unstructured":"Fu, Y., Liang, P., Tahir, A., Li, Z., Shahin, M., Yu, J.: Security weaknesses of copilot generated code in github (2023). https:\/\/arxiv.org\/pdf\/2310.02059.pdf. Accessed 14 Dec 2023"},{"key":"8_CR10","unstructured":"Github: Github copilot - your AI pair programmer (2023). https:\/\/github.com\/features\/copilot\/. Accessed 11 Dec 2023"},{"key":"8_CR11","unstructured":"Github: Github copilot - november 30th update (2023). https:\/\/github.blog\/changelog\/2023-11-30-github-copilot-november-30th-update\/. Accessed 26 Dec 2023"},{"key":"8_CR12","unstructured":"Hossain, S.B., et al.: A deep dive into large language models for automated bug localization and repair (2024). https:\/\/arxiv.org\/abs\/2404.11595"},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Kabir, S., Udo-Imeh, D.N., Kou, B., Zhang, T.: Is stack overflow obsolete? an empirical study of the characteristics of chatgpt answers to stack overflow questions. In: Mueller, F.F., Kyburz, P., Williamson, J.R., Sas, C., Wilson, M.L., Dugas, P.O.T., Shklovski, I. (eds.) Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, May 11\u201316, 2024. pp. 935:1\u2013935:17. ACM (2024). https:\/\/doi.org\/10.1145\/3613904.3642596, https:\/\/doi.org\/10.1145\/3613904.3642596","DOI":"10.1145\/3613904.3642596"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Khoury, R., Avila, A.R., Brunelle, J., Camara, B.M.: How secure is code generated by chatgpt? (2023). https:\/\/arxiv.org\/pdf\/2304.09655.pdf. Accessed 14 Dec 2023","DOI":"10.1109\/SMC53992.2023.10394237"},{"key":"8_CR15","unstructured":"Meta: Llama 2: open source, free for research and commercial use (2023). https:\/\/llama.meta.com\/llama2. Accessed 18 Dec 2023"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Nam, D., Macvean, A., Hellendoorn, V., Vasilescu, B., Myers, B.: Using an llm to help with code understanding. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. ICSE \u201924, Association for Computing Machinery, New York (2024). https:\/\/doi.org\/10.1145\/3597503.3639187. https:\/\/doi.org\/10.1145\/3597503.3639187","DOI":"10.1145\/3597503.3639187"},{"issue":"3","key":"8_CR17","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MS.2023.3248401","volume":"40","author":"I Ozkaya","year":"2023","unstructured":"Ozkaya, I.: Application of large language models to software engineering tasks: opportunities, risks, and implications. IEEE Softw. 40(3), 4\u20138 (2023). https:\/\/doi.org\/10.1109\/MS.2023.3248401","journal-title":"IEEE Softw."},{"key":"8_CR18","doi-asserted-by":"publisher","unstructured":"Pearce, H., Ahmad, B., Tan, B., Dolan-Gavitt, B., Karri, R.: Asleep at the keyboard? assessing the security of github copilot\u2019s code contributions. In: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, May 22\u201326, 2022. pp. 754\u2013768. IEEE (2022). https:\/\/doi.org\/10.1109\/SP46214.2022.9833571. https:\/\/doi.org\/10.1109\/SP46214.2022.9833571","DOI":"10.1109\/SP46214.2022.9833571"},{"key":"8_CR19","unstructured":"Perry, N., Srivastava, M., Kumar, D., Boneh, D.: Do users write more insecure code with AI assistants? (2022). https:\/\/arxiv.org\/pdf\/2211.03622.pdf. Accessed 14 Dec 2023"},{"key":"8_CR20","doi-asserted-by":"publisher","unstructured":"Robles-Aguilar, A., Ochar\u00e1n-Hern\u00e1ndez, J.O., S\u00e1nchez-Garc\u00eda, A.J., Lim\u00f3n, X.: Software design and artificial intelligence: a systematic mapping study. In: 2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT), pp. 132\u2013141 (2021). https:\/\/doi.org\/10.1109\/CONISOFT52520.2021.00028","DOI":"10.1109\/CONISOFT52520.2021.00028"},{"key":"8_CR21","unstructured":"Saravia, E.: Prompt engineering guide (2023). https:\/\/www.promptingguide.ai\/. Accessed 27 Dec 2023"},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Sheard, J., Denny, P., Hellas, A., Leinonen, J., Malmi, L., Simon: Instructor perceptions of AI code generation tools - a multi-institutional interview study. In: Proceedings of the 55th ACM Technical Symposium on Computer Science Education, vol. 1, p. 1223\u20131229. SIGCSE 2024, Association for Computing Machinery, New York (2024). https:\/\/doi.org\/10.1145\/3626252.3630880. https:\/\/doi.org\/10.1145\/3626252.3630880","DOI":"10.1145\/3626252.3630880"},{"key":"8_CR23","unstructured":"Shieh, J.: Best practices for prompt engineering with openai api (2023). https:\/\/help.openai.com\/en\/articles\/6654000-best-practices-for-prompt-engineering-with-openai-api. Accessed 17 Dec 2023"},{"key":"8_CR24","doi-asserted-by":"publisher","unstructured":"Yuan, Z., Liu, M., Ding, S., Wang, K., Chen, Y., Peng, X., Lou, Y.: Evaluating and improving chatgpt for unit test generation. Proc. ACM Softw. Eng. 1(FSE) (2024). https:\/\/doi.org\/10.1145\/3660783. https:\/\/doi.org\/10.1145\/3660783","DOI":"10.1145\/3660783"},{"key":"8_CR25","unstructured":"Zhao, S.: Github copilot now has a better AI model and new capabilities (2023). https:\/\/github.blog\/2023-02-14-github-copilot-now-has-a-better-ai-model-and-new-capabilities\/. Accessed 26 Dec 2023"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92886-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:26Z","timestamp":1747289606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92886-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928857","9783031928864"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92886-4_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}