{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T06:33:21Z","timestamp":1765262001487,"version":"3.46.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100017005","name":"Allen Institute for Artificial Intelligence","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100017005","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,4]]},"DOI":"10.1109\/saner-c66551.2025.00016","type":"proceedings-article","created":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T18:38:52Z","timestamp":1765219132000},"page":"61-68","source":"Crossref","is-referenced-by-count":0,"title":["Malicious and Unintentional Disclosure Risks in Large Language Models for Code Generation"],"prefix":"10.1109","author":[{"given":"Rafiqul","family":"Rabin","sequence":"first","affiliation":[{"name":"UL Research Institutes,Digital Safety Research Institute"}]},{"given":"Sean","family":"McGregor","sequence":"additional","affiliation":[{"name":"UL Research Institutes,Digital Safety Research Institute"}]},{"given":"Nick","family":"Judd","sequence":"additional","affiliation":[{"name":"UL Research Institutes,Digital Safety Research Institute"}]}],"member":"263","reference":[{"article-title":"The Stack: 3 TB of permissively licensed source code","year":"2022","author":"Kocetkov","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510150"},{"key":"ref3","first-page":"2527","article-title":"Pushed by accident: A mixed-methods study on strategies of handling secret information in source code repositories","volume-title":"32nd USENIX Security Symposium","author":"Krause"},{"key":"ref4","first-page":"267","article-title":"The secret sharer: Evaluating and testing unintended memorization in neural networks","volume-title":"28th USENIX Security Symposium","author":"Carlini"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.privatenlp-1.1"},{"article-title":"Quantifying memorization across neural language models","volume-title":"The Eleventh International Conference on Learning Representations","author":"Carlini","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.107066"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-short.129"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3660818"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639133"},{"key":"ref11","first-page":"2133","article-title":"CodexLeaks: Privacy leaks from code generation language models in GitHub Copilot","volume-title":"32nd USENIX Security Symposium","author":"Niu"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639074"},{"article-title":"Evaluating large language models trained on code","year":"2021","author":"Chen","key":"ref13"},{"article-title":"Program synthesis with large language models","year":"2021","author":"Austin","key":"ref14"},{"article-title":"Code Llama: Open foundation models for code","year":"2023","author":"Roziere","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1108\/ws.2000.07949fab.004"},{"article-title":"Starcoder 2 and The Stack v2: The next generation","year":"2024","author":"Lozhkov","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.841"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.840"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i28.35162"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aies.v7i1.31635"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-emnlp.148"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179300"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00141"},{"key":"ref25","first-page":"2633","article-title":"Extracting training data from large language models","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Carlini"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-emnlp.621"},{"article-title":"Learning to refuse: Towards mitigating privacy risks in LLMs","year":"2024","author":"Liu","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3357713.3384290"},{"article-title":"Beyond memorization: Violating privacy via inference with large language models","volume-title":"The Twelfth International Conference on Learning Representations","author":"Staab","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3630106.3658911"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i21.30346"},{"article-title":"Analysing mathematical reasoning abilities of neural models","year":"2019","author":"Saxton","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3650105.3652298"}],"event":{"name":"2025 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)","start":{"date-parts":[[2025,3,4]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2025,3,4]]}},"container-title":["2025 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11272146\/11272056\/11272154.pdf?arnumber=11272154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T06:16:21Z","timestamp":1765260981000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11272154\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,4]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/saner-c66551.2025.00016","relation":{},"subject":[],"published":{"date-parts":[[2025,3,4]]}}}