{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T10:10:04Z","timestamp":1752142204091,"version":"3.41.2"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031976223","type":"print"},{"value":"9783031976230","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97623-0_3","type":"book-chapter","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:27:57Z","timestamp":1752139677000},"page":"44-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hiding in\u00a0Plain Sight: On the\u00a0Robustness of\u00a0AI-Generated Code Detection"],"prefix":"10.1007","author":[{"given":"Saman","family":"Pordanesh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5103-9067","authenticated-orcid":false,"given":"Sufiyan","family":"Bukhari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7642-3638","authenticated-orcid":false,"given":"Benjamin","family":"Tan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0432-3686","authenticated-orcid":false,"given":"Lorenzo","family":"De Carli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Sejfia, A., Schafer, M.: Practical automated detection of malicious NPM packages. In: ICSE (2022)","DOI":"10.1145\/3510003.3510104"},{"key":"3_CR2","unstructured":"Anthropic: Introducing claude (2023). https:\/\/www.anthropic.com\/news\/introducing-claude"},{"key":"3_CR3","unstructured":"Austin, J., et al.: Program synthesis with large language models. arXiv preprint arXiv:2108.07732 (2021)"},{"key":"3_CR4","unstructured":"Brown, T.B., et\u00a0al.: Language models are few-shot learners. arXiv preprint arXiv:2005.14165 (2020)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bukhari, S., Tan, B., De\u00a0Carli, L.: Distinguishing AI- and human-generated code: a case study. In: ACM CCS SCORED Workshop (2023)","DOI":"10.1145\/3605770.3625215"},{"key":"3_CR6","unstructured":"Caliskan-Islam, A., et al.: De-anonymizing programmers via code stylometry. In: USENIX Security Symposium (2015)"},{"key":"3_CR7","unstructured":"Chen, M., et\u00a0al.: Evaluating large language models trained on code. arXiv preprint arXiv:2107.03374 (2021)"},{"key":"3_CR8","unstructured":"Claburn, T.: GitHub and OpenAI fail to wriggle out of Copilot lawsuit (2023). https:\/\/www.theregister.com\/2023\/05\/12\/github_microsoft_openai_copilot\/"},{"key":"3_CR9","unstructured":"Dohmke, T.: Bringing developer choice to copilot with anthropic\u2019s Claude 3.5 sonnet, Google\u2019s Gemini 1.5 pro, and OpenAI\u2019s O1-preview (2024). https:\/\/github.blog\/news-insights\/product-news\/bringing-developer-choice-to-copilot\/"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Ly Vu, D., Newman, Z., Speed Meyers, J.: Bad snakes: understanding and improving python package index malware scanning. In: ICSE (2023)","DOI":"10.1109\/ICSE48619.2023.00052"},{"key":"3_CR11","unstructured":"Friedman, N.: Introducing GitHub Copilot: your AI pair programmer (2021). https:\/\/github.blog\/2021-06-29-introducing-github-copilot-ai-pair-programmer\/"},{"key":"3_CR12","unstructured":"GPTZero: AI detector - the original AI checker for ChatGPT & more. https:\/\/gptzero.me\/"},{"key":"3_CR13","unstructured":"HackerNews: Ask HN: does your company ban GitHub Copilot? Hacker news (2023). https:\/\/news.ycombinator.com\/item?id=34914810"},{"key":"3_CR14","unstructured":"Hendrycks, D., et al.: Measuring coding challenge competence with apps. arXiv preprint arXiv:2105.09938 (2021)"},{"key":"3_CR15","unstructured":"Husain, H., Wu, H.H., Gazit, T., Allamanis, M., Brockschmidt, M.: Codesearchnet challenge: evaluating the state of semantic code search. arXiv preprint arXiv:1909.09436 (2020)"},{"key":"3_CR16","unstructured":"IBM Research: github\/project_codenet (2025). https:\/\/github.com\/IBM\/Project_CodeNet"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Idialu, O.J., Mathews, N.S., Maipradit, R., Atlee, J.M., Nagappan, M.: Whodunit: classifying code as human authored or GPT-4 generated \u2013 a case study on CodeChef problems. In: MSR (2024)","DOI":"10.1145\/3643991.3644926"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Mathews, N.S., Nagappan, M.: Test-driven development and LLM-based code generation. In: ASE (2024)","DOI":"10.1145\/3691620.3695527"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"McCabe, T.J.: A complexity measure. IEEE Trans. Softw. Eng. SE-2(4) (1976)","DOI":"10.1109\/TSE.1976.233837"},{"key":"3_CR20","unstructured":"Meta AI: Introducing Meta Llama 3: the most capable openly available LLM to date (2025). https:\/\/ai.meta.com\/blog\/meta-llama-3\/"},{"key":"3_CR21","unstructured":"Mitchell, E., Lee, Y., Khazatsky, A., Manning, C.D., Finn, C.: DetectGPT: zero-shot machine-generated text detection using probability curvature. arXiv preprint arXiv:2301.11305 (2023)"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Nguyen, P.T., Di Rocco, J., Di Sipio, C., Rubei, R., Di Ruscio, D., Di Penta, M.: GPTSniffer: a CodeBERT-based classifier to detect source code written by ChatGPT. J. Syst. Softw., 112059 (2024)","DOI":"10.1016\/j.jss.2024.112059"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Oman, P.W., Cook, C.R.: Programming style authorship analysis. In: CSC (1989)","DOI":"10.1145\/75427.75469"},{"key":"3_CR24","unstructured":"OpenAI: Introducing ChatGPT (2022). https:\/\/openai.com\/index\/chatgpt\/"},{"key":"3_CR25","unstructured":"OpenAI: Best practices for prompt engineering with the OpenAI API, OpenAI Help Center (2025). https:\/\/help.openai.com\/en\/articles\/6654000-best-practices-for-prompt-engineering-with-the-openai-api"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Pearce, H., Ahmad, B., Tan, B., Dolan-Gavitt, B., Karri, R.: Asleep at the keyboard? Assessing the security of GitHub Copilot\u2019s code contributions. In: IEEE S &P (2022)","DOI":"10.1109\/SP46214.2022.9833571"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Perry, N., Srivastava, M., Kumar, D., Boneh, D.: Do users write more insecure code with AI assistants? In: ACM CCS (2023)","DOI":"10.1145\/3576915.3623157"},{"key":"3_CR28","unstructured":"Pichai, S., Hassabis, D.: Introducing Gemini: our largest and most capable AI model (2023). https:\/\/blog.google\/technology\/ai\/google-gemini-ai\/"},{"key":"3_CR29","unstructured":"Roberto Torres: Apple restricts ChatGPT, GitHub Copilot use over data worries: report (2023). https:\/\/www.ciodive.com\/news\/apple-chatgpt-openai-copilot-generative-AI\/650816\/"},{"key":"3_CR30","unstructured":"Schuster, R., Song, C., Tromer, E., Shmatikov, V.: You autocomplete me: Poisoning vulnerabilities in neural code completion. In: USENIX Security Symposium (2021)"},{"key":"3_CR31","unstructured":"Shani, I., GitHub Staff: survey reveals AI\u2019s impact on the developer experience (2023). https:\/\/github.blog\/2023-06-13-survey-reveals-ais-impact-on-the-developer-experience\/"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Shi, Y., Zhang, H., Wan, C., Gu, X.: Between lines of code: unraveling the distinct patterns of machine and human programmers. In: ICSE (2025)","DOI":"10.1109\/ICSE55347.2025.00005"},{"key":"3_CR33","unstructured":"Suresh, T., Ugare, S., Singh, G., Misailovic, S.: Is the watermarking of LLM-generated code robust? arXiv preprint arXiv:2403.17983 (2025)"},{"key":"3_CR34","unstructured":"TIOBE: TIOBE index (2025). https:\/\/www.tiobe.com\/tiobe-index\/"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Tufano, R., Mastropaolo, A., Pepe, F., Dabi\u0107, O., Di\u00a0Penta, M., Bavota, G.: Unveiling ChatGPT\u2019s usage in open source projects: a mining-based study. In: MSR (2024)","DOI":"10.1145\/3643991.3644918"},{"key":"3_CR36","unstructured":"Vaidya, R.K., De\u00a0Carli, L., Davidson, D., Rastogi, V.: Security issues in language-based software ecosystems. arXiv preprint arXiv:1903.02613 (2021)"},{"key":"3_CR37","unstructured":"Watson, D.: Source code stylometry and authorship attribution for open source, Ph.D. thesis, University of Waterloo (2019)"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Weidinger, L., et al.: Taxonomy of risks posed by language models. In: ACM FAccT (2022)","DOI":"10.1145\/3531146.3533088"},{"key":"3_CR39","unstructured":"Yan, S., et al.: An LLM-assisted easy-to-trigger backdoor attack on code completion models: injecting disguised vulnerabilities against strong detection. In: USENIX Security Symposium (2024)"},{"key":"3_CR40","unstructured":"Yang, X., Zhang, K., Chen, H., Petzold, L., Wang, W.Y., Cheng, W.: Zero-shot detection of machine-generated codes. arXiv preprint arXiv:2310.05103 (2023)"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Ye, T., et al.: Uncovering LLM-generated code: a zero-shot synthetic code detector via code rewriting. arXiv preprint arXiv:2405.16133 (2024)","DOI":"10.1609\/aaai.v39i1.32082"},{"key":"3_CR42","unstructured":"Zhou, Y., et al.: Large language models are human-level prompt engineers. arXiv preprint arXiv:2211.01910 (2023)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97623-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:28:07Z","timestamp":1752139687000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97623-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031976223","9783031976230"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97623-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva.org\/dimva2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}