{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:01:32Z","timestamp":1776182492306,"version":"3.50.1"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179324","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"2339-2356","source":"Crossref","is-referenced-by-count":222,"title":["Examining Zero-Shot Vulnerability Repair with Large Language Models"],"prefix":"10.1109","author":[{"given":"Hammond","family":"Pearce","sequence":"first","affiliation":[{"name":"New York University"}]},{"given":"Benjamin","family":"Tan","sequence":"additional","affiliation":[{"name":"University of Calgary"}]},{"given":"Baleegh","family":"Ahmad","sequence":"additional","affiliation":[{"name":"New York University"}]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[{"name":"New York University"}]},{"given":"Brendan","family":"Dolan-Gavitt","sequence":"additional","affiliation":[{"name":"New York University"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Evaluating Large Language Models Trained on Code","author":"Chen","year":"2021"},{"key":"ref2","volume-title":"GitHub Copilot \u2022 Your AI pair programmer"},{"key":"ref3","volume-title":"Discover Use Cases for AI21 Studio and Jurassic-1"},{"key":"ref4","volume-title":"Completion - OpenAI API"},{"key":"ref5","article-title":"Language Models are Few-Shot Learners","author":"Brown","year":"2020"},{"key":"ref6","first-page":"24","article-title":"Language Models are Unsupervised Multitask Learners","author":"Radford","year":"2019"},{"key":"ref7","article-title":"OpenAI Codex","year":"2021"},{"key":"ref8","article-title":"Jurassic-1: Technical Details and Evaluation","volume-title":"AI21 Labs, Tech. Rep.","author":"Lieber","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3374009"},{"key":"ref10","first-page":"227","article-title":"Classifying Code Comments in Java Open-Source Software Systems","volume-title":"2017 IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR)","author":"Pascarella"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294276"},{"key":"ref12","article-title":"An Empirical Cybersecurity Evaluation of GitHub Copilot\u2019s Code Contributions","author":"Pearce","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2940179"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00107"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3340544"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3460945.3464951"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134072"},{"key":"ref18","article-title":"CWE - CWE-Compatible Products and Services","year":"2020"},{"key":"ref19","volume-title":"Source Code Analysis Tools"},{"key":"ref20","first-page":"309","article-title":"AddressSanitizer: A Fast Address Sanity Checker","volume-title":"2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Serebryany"},{"key":"ref21","article-title":"GCC Undefined Behavior Sanitizer - ubsan","author":"Polacek","year":"2014"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3105906"},{"issue":"2","key":"ref23","first-page":"23","article-title":"A New Algorithm for Data Compression","volume":"12","author":"Gage","year":"1994","journal-title":"C Users Journal"},{"key":"ref24","article-title":"How to generate text: using different decoding methods for language generation with Transformers","author":"von Platen","year":"2020"},{"key":"ref25","article-title":"Jurassic-1 Language Models - AI21 Studio Docs","year":"2021"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1145\/3520312.3534862","article-title":"A Systematic Evaluation of Large Language Models of Code","author":"Xu","year":"2022"},{"key":"ref27","volume-title":"Examples - OpenAI API"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613836"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389259"},{"key":"ref30","article-title":"CodeQL documentation","year":"2021"},{"key":"ref31","article-title":"Code and dataset for\u201dExamining Zero-Shot Vulnerability Repair with Large Language Models\"","volume-title":"dataset","author":"Pearce","year":"2022"},{"key":"ref32","article-title":"2021 CWE Top 25 Most Dangerous Software Weaknesses","year":"2021"},{"key":"ref33","article-title":"CWE-1194: CWE VIEW: Hardware Design","year":"2021"},{"key":"ref34","article-title":"Verilator User\u2019s Guide \u2014 Verilator 4.202 documentation"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3418461"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485363"},{"key":"ref37","first-page":"1989","article-title":"ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Yagemann"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566211"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451131"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815412"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771791"},{"issue":"1","key":"ref43","first-page":"54","article-title":"GenProg: A Generic Method for Automatic Software Repair","volume-title":"IEEE Transactions on Software Engineering","volume":"38","author":"Le Goues","year":"2012"},{"key":"ref44","article-title":"Program Synthesis with Large Language Models","author":"Austin","year":"2021"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/11671299_34"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2012.6418259"},{"key":"ref47","first-page":"1019","article-title":"What would other programmers do: suggesting solutions to error messages","volume-title":"Proceedings of the 28th international conference on Human factors in computing systems - CHI \u201910","author":"Hartmann"},{"key":"ref48","first-page":"70","article-title":"BugFix: A learning-based tool to assist developers in fixing bugs","volume-title":"2009 IEEE 17th International Conference on Program Comprehension","author":"Jeffrey"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM51674.2020.00027"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0002-y"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240732"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397369"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179324.pdf?arnumber=10179324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:14:27Z","timestamp":1721452467000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179324\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":52,"aliases":["10.1109\/sp46215.2023.10179420"],"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179324","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}