{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:54:01Z","timestamp":1776275641506,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679444","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"395-400","source":"Crossref","is-referenced-by-count":5,"title":["Can a Llama Be a Watchdog? Exploring Llama 3 and Code Llama for Static Application Security Testing"],"prefix":"10.1109","author":[{"given":"Claudio","family":"Curto","sequence":"first","affiliation":[{"name":"Universit&#x00E0; degli Studi di Catania,Department of Electrical Electronic and Computer Engineering,Catania,Italy,95125"}]},{"given":"Daniela","family":"Giordano","sequence":"additional","affiliation":[{"name":"Universit&#x00E0; degli Studi di Catania,Department of Electrical Electronic and Computer Engineering,Catania,Italy,95125"}]},{"given":"Daniel Gustav","family":"Indelicato","sequence":"additional","affiliation":[{"name":"Darwin Technologies S.r.l., EHT S.c.p.A.,Catania,Italia,95129"}]},{"given":"Vladimiro","family":"Patatu","sequence":"additional","affiliation":[{"name":"EHT S.c.p.A.,Catania,Italia,95129"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"CVE published by year","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/AIIoT54504.2022.9817336"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3194452.3194469"},{"key":"ref4","first-page":"292","article-title":"Vulnerability detection with fine-grained interpretations","volume-title":"Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ser. ESEC \/ FSE. Association for Computing Machinery","author":"Li","year":"2021"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1145\/3524842.3528452","article-title":"Linevul: A transformer-based line-level vulnerability prediction","volume-title":"2022 IEEE\/ACM 19th International Conference on Mining Software Repositories (MSR)","author":"Fu","year":"2022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3527949"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107303"},{"key":"ref8","first-page":"107458","volume-title":"Making vulnerability prediction more practical: Prediction, categorization, and localization","author":"Liu"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3305244"},{"key":"ref10","volume-title":"ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We?","author":"Fu"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1145\/3607199.3607242","article-title":"DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection","volume-title":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","author":"Chen","year":"2023"},{"key":"ref12","volume-title":"Llama 3 model card","year":"2024"},{"key":"ref13","volume-title":"Llama 2: Open Foundation and Fine-Tuned Chat Models","author":"Touvron","year":"2023"},{"key":"ref14","author":"Roziere","year":"2023","journal-title":"Code Llama: Open Foundation Models for Code"},{"key":"ref15","first-page":"508","article-title":"A c \/ c ++ code vulnerability dataset with code changes and cve summaries","volume-title":"IEEE\/ACM 17th International Conference on Mining Software Repositories (MSR)","author":"Fan","year":"2020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref17","first-page":"1","article-title":"A systematic evaluation of large language models of code","volume-title":"Proceedings of the 6th ACM SIGPLAN International Symposium on Machine Programming, ser. MAPS 2022","author":"Xu"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549162"},{"key":"ref19","volume-title":"An Empirical Study of Automated Vulnerability Localization with Large Language Models","author":"Zhang"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5220\/0012719400003767"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/QRS57517.2022.00015"},{"key":"ref22","volume-title":"CodeT5: Identifier-aware Unified Pre-trained Encoder-Decoder Models for Code Understanding and Generation","author":"Wang"},{"key":"ref23","volume-title":"Peft: State-of-the-art parameter-efficient fine-tuning methods","author":"Mangrulkar","year":"2022"},{"key":"ref24","volume-title":"LoRA: Low-Rank Adaptation of Large Language Models","author":"Hu"},{"key":"ref25","first-page":"10088","volume":"36","author":"Dettmers","journal-title":"QLoRA: Efficient Finetuning of Quan-tized LLMs"},{"issue":"140","key":"ref26","first-page":"1","volume":"21","author":"Raffel","journal-title":"Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679444.pdf?arnumber=10679444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:59:05Z","timestamp":1727240345000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679444","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}