{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:58:56Z","timestamp":1772935136627,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11400849","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"8291-8293","source":"Crossref","is-referenced-by-count":0,"title":["Durinn: Scaling Vibe Coding Auditing"],"prefix":"10.1109","author":[{"given":"Ryan Anthony","family":"Marinelli","sequence":"first","affiliation":[{"name":"University of Oslo,Digital Security Research Group,Department of Informatics,Norway"}]},{"given":"Victor","family":"Strandmoe","sequence":"additional","affiliation":[{"name":"Durinn AS,Oslo,Norway"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Security weaknesses of github copilot-generated code in github projects: An empirical study","author":"Fu","year":"2023","journal-title":"arXiv preprint"},{"key":"ref2","volume-title":"Wayback copilot: Using microsoft\u2019s copilot to expose thousands of private github repositories.","author":"Dror","year":"2025"},{"key":"ref3","article-title":"Measurements of the most significant software security weaknesses","author":"Galhardo","year":"2021","journal-title":"arXiv preprint"},{"key":"ref4","volume-title":"Owasp top 10: 2025 - the ten most critical web application security risks.","year":"2025"},{"key":"ref5","volume-title":"Cve-2025-4875: Insufficient rls policies.","year":"2025"},{"key":"ref6","volume-title":"Genai code security report.","year":"2024"},{"key":"ref7","volume-title":"Cve-2025-48757 detail.","year":"2025"},{"key":"ref8","volume-title":"Semgrep: Lightweight static analysis for developers"},{"key":"ref9","volume-title":"Magicoder: Source code is all you need.","author":"Wei","year":"2023"},{"key":"ref10","volume-title":"Owasp juice shop: The most modern and sophisticated insecure web application.","year":"2025"},{"key":"ref11","volume-title":"Invoify: Simple invoice generator.","year":"2025"},{"key":"ref12","volume-title":"Invoify: Commit 8488df3.","year":"2024"},{"key":"ref13","volume-title":"Billify-generator: pull request.","year":"2025"},{"key":"ref14","volume-title":"Aisi sandboxing: Technical guidance.","year":"2025"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.894"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11400849.pdf?arnumber=11400849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:23:42Z","timestamp":1772868222000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11400849\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11400849","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}