{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T03:46:33Z","timestamp":1777866393236,"version":"3.51.4"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031982071","type":"print"},{"value":"9783031982088","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T00:00:00Z","timestamp":1752019200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T00:00:00Z","timestamp":1752019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-98208-8_16","type":"book-chapter","created":{"date-parts":[[2025,7,13]],"date-time":"2025-07-13T17:56:51Z","timestamp":1752429411000},"page":"273-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FAMiT: Mitigating False Alarms for\u00a0Program Analysis Using Large Language Models"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2281-252X","authenticated-orcid":false,"given":"Jiabao","family":"Zeng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6707-0919","authenticated-orcid":false,"given":"Yuanlin","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8208-466X","authenticated-orcid":false,"given":"Ran","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6800-4136","authenticated-orcid":false,"given":"Yuanmin","family":"Xie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3272-7606","authenticated-orcid":false,"given":"Kejia","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4679-0488","authenticated-orcid":false,"given":"Min","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,9]]},"reference":[{"key":"16_CR1","unstructured":"Anthropic: Claude 3.5 Sonnet model card addendum (2024). https:\/\/www-cdn.anthropic.com\/fed9cc193a14b84131812372d8d5857f8f304c52\/Model_Card_Claude_3_Addendum.pdf"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Baca, D.: Identifying security relevant warnings from static code analysis tools through code tainting. In: 2010 International Conference on Availability, Reliability and Security, pp. 386\u2013390. IEEE (2010)","DOI":"10.1109\/ARES.2010.108"},{"key":"16_CR3","unstructured":"Brown, T., et\u00a0al.: Language models are few-shot learners. In: Advances in Neural Information Processing Systems, pp. 1877\u20131901 (2020)"},{"key":"16_CR4","unstructured":"Chen, L., et\u00a0al.: A survey on evaluating large language models in code generation tasks (2024). https:\/\/arxiv.org\/abs\/2408.16498"},{"key":"16_CR5","unstructured":"DeepSeek-AI: DeepSeek-V3 technical report (2024). https:\/\/arxiv.org\/abs\/2412.19437"},{"key":"16_CR6","unstructured":"DeepSeek-AI: DeepSeek-R1: Incentivizing reasoning capability in LLMs via reinforcement learning (2025). https:\/\/arxiv.org\/abs\/2501.12948"},{"key":"16_CR7","unstructured":"Facebook: Pysa (2025). https:\/\/github.com\/facebook\/pyre-check"},{"issue":"6","key":"16_CR8","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1007\/s11390-020-0525-z","volume":"35","author":"F Gao","year":"2020","unstructured":"Gao, F., Wang, Y., Wang, L., Yang, Z., Li, X.: Automatic buffer overflow warning validation. J. Comput. Sci. Technol. 35(6), 1406\u20131427 (2020)","journal-title":"J. Comput. Sci. Technol."},{"issue":"12","key":"16_CR9","doi-asserted-by":"publisher","first-page":"5154","DOI":"10.1109\/TSE.2023.3329667","volume":"49","author":"Z Guo","year":"2023","unstructured":"Guo, Z., et al.: Mitigating false positive static analysis warnings: progress, challenges, and opportunities. IEEE Trans. Softw. Eng. 49(12), 5154\u20135188 (2023)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Johnson, B., Song, Y., Murphy-Hill, E., Bowdidge, R.: Why don\u2019t software developers use static analysis tools to find bugs? In: 2013 35th International Conference on Software Engineering, pp. 672\u2013681. IEEE (2013)","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Kang, H.J., Aw, K.L., Lo, D.: Detecting false alarms from automatic static analysis tools: how far are we? In: Proceedings of the 44th International Conference on Software Engineering, pp. 698\u2013709. ACM (2022)","DOI":"10.1145\/3510003.3510214"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Khare, A., Dutta, S., Li, Z., Solko-Breslin, A., Alur, R., Naik, M.: Understanding the effectiveness of large language models in detecting security vulnerabilities (2024). https:\/\/arxiv.org\/abs\/2311.16169","DOI":"10.1109\/ICST62969.2025.10988968"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Li, H., Hao, Y., Zhai, Y., Qian, Z.: Assisting static analysis with large language models: a chatgpt experiment. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 2107\u20132111. ACM (2023)","DOI":"10.1145\/3611643.3613078"},{"issue":"OOPSLA1","key":"16_CR14","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1145\/3649828","volume":"8","author":"H Li","year":"2024","unstructured":"Li, H., Hao, Y., Zhai, Y., Qian, Z.: Enhancing static analysis for practical bug detection: an LLM-integrated approach. Proc. ACM Program. Lang. 8(OOPSLA1), 474\u2013499 (2024)","journal-title":"Proc. ACM Program. Lang."},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Muske, T., Serebrenik, A.: Techniques for efficient automated elimination of false positives. In: 2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation, pp. 259\u2013263. IEEE (2020)","DOI":"10.1109\/SCAM51674.2020.00035"},{"key":"16_CR16","doi-asserted-by":"publisher","unstructured":"Muske, T., Talluri, R., Serebrenik, A.: Reducing static analysis alarms based on non-impacting control dependencies. In: Lin, A.W. (ed.) APLAS 2019. LNCS, vol. 11893, pp. 115\u2013135. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34175-6_7","DOI":"10.1007\/978-3-030-34175-6_7"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T., Maleehuan, P., Aoki, T., Tomita, T., Yamada, I.: Reducing false positives of static analysis for SEI CERT C coding standard. In: 2019 IEEE\/ACM Joint 7th International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice, pp. 41\u201348. IEEE (2019)","DOI":"10.1109\/CESSER-IP.2019.00015"},{"key":"16_CR18","unstructured":"OpenAI: GPT-4 technical report (2023). https:\/\/arxiv.org\/abs\/2303.08774"},{"key":"16_CR19","unstructured":"OpenAI: Hello GPT-4o (2024). https:\/\/openai.com\/index\/hello-gpt-4o"},{"key":"16_CR20","unstructured":"OpenAI: Introducing OpenAI o1-preview (2024). https:\/\/openai.com\/index\/introducing-openai-o1-preview\/"},{"key":"16_CR21","unstructured":"Pei, K., Bieber, D., Shi, K., Sutton, C., Yin, P.: Can large language models reason about program invariants? In: Proceedings of the 40th International Conference on Machine Learning, pp. 27496\u201327520. PMLR (2023)"},{"key":"16_CR22","unstructured":"Pylint contributors: Pylint (2025). https:\/\/github.com\/pylint-dev\/pylint"},{"key":"16_CR23","unstructured":"Qu, Y., Zhang, T., Garg, N., Kumar, A.: Recursive introspection: teaching language model agents how to self-improve (2024). https:\/\/arxiv.org\/abs\/2407.18219"},{"key":"16_CR24","unstructured":"Radford, A., Narasimhan, K., Salimans, T., Sutskever, I.: Improving language understanding by generative pre-training (2018). https:\/\/api.semanticscholar.org\/CorpusID:49313245"},{"key":"16_CR25","unstructured":"Radford, A., Wu, J., Child, R., Luan, D., Amodei, D., Sutskever, I.: Language models are unsupervised multitask learners (2019). https:\/\/cdn.openai.com\/better-language-models\/language_models_are_unsupervised_multitask_learners.pdf"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Ribeiro, A., Meirelles, P., Lago, N., Kon, F.: Ranking warnings from multiple source code static analyzers via ensemble learning. In: Proceedings of the 15th International Symposium on Open Collaboration, pp. 1\u201310. ACM (2019)","DOI":"10.1145\/3306446.3340828"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Ruohonen, J., Hjerppe, K., Rindell, K.: A large-scale security-oriented static analysis of Python packages in PyPI. In: 2021 18th International Conference on Privacy, Security and Trust, pp. 1\u201310 (2021)","DOI":"10.1109\/PST52912.2021.9647791"},{"issue":"4","key":"16_CR28","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/3188720","volume":"61","author":"C Sadowski","year":"2018","unstructured":"Sadowski, C., Aftandilian, E., Eagle, A., Miller-Cushon, L., Jaspan, C.: Lessons from building static analysis tools at Google. Commun. ACM 61(4), 58\u201366 (2018)","journal-title":"Commun. ACM"},{"key":"16_CR29","unstructured":"Snell, C., Lee, J., Xu, K., Kumar, A.: Scaling LLM test-time compute optimally can be more effective than scaling model parameters (2024). https:\/\/arxiv.org\/abs\/2408.03314"},{"issue":"13s","key":"16_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3582688","volume":"55","author":"Y Song","year":"2023","unstructured":"Song, Y., Wang, T., Cai, P., Mondal, S.K., Sahoo, J.P.: A comprehensive survey of few-shot learning: evolution, applications, challenges, and opportunities. ACM Comput. Surv. 55(13s), 1\u201340 (2023)","journal-title":"ACM Comput. Surv."},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Sun, Y., et\u00a0al.: GPTScan: detecting logic vulnerabilities in smart contracts by combining GPT with program analysis. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, pp. 1\u201313. ACM (2024)","DOI":"10.1145\/3597503.3639117"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-98208-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T08:37:05Z","timestamp":1777538225000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-98208-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,9]]},"ISBN":["9783031982071","9783031982088"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-98208-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,9]]},"assertion":[{"value":"9 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Theoretical Aspects of Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tase2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cyprusconferences.org\/tase2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}