{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T20:29:43Z","timestamp":1777926583976,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623157","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"2785-2799","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":145,"title":["Do Users Write More Insecure Code with AI Assistants?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4254-4712","authenticated-orcid":false,"given":"Neil","family":"Perry","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7816-8391","authenticated-orcid":false,"given":"Megha","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0224-5031","authenticated-orcid":false,"given":"Deepak","family":"Kumar","sequence":"additional","affiliation":[{"name":"Stanford University &amp; UC San Diego, Stanford &amp; La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0820-0421","authenticated-orcid":false,"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Program synthesis with large language models. https:\/\/arxiv.org\/abs\/2108.07732","author":"Austin J.","year":"2021","unstructured":"J. Austin, A. Odena, M. Nye, M. Bosma, H. Michalewski, D. Dohan, E. Jiang, C. Cai, M. Terry, Q. Le, and C. Sutton. Program synthesis with large language models. https:\/\/arxiv.org\/abs\/2108.07732, 2021."},{"key":"e_1_3_2_1_2_1","volume-title":"Grounded copilot: How programmers interact with code-generating models. https:\/\/arxiv.org\/abs\/2206.15000","author":"Barke S.","year":"2022","unstructured":"S. Barke, M. B. James, and N. Polikarpova. Grounded copilot: How programmers interact with code-generating models. https:\/\/arxiv.org\/abs\/2206.15000, 2022."},{"key":"e_1_3_2_1_3_1","author":"Benjamini Y.","year":"1995","unstructured":"Y. Benjamini and Y. Hochberg. Controlling the false discovery rate: a practical and powerful approach to multiple testing. Journal of the Royal statistical society: series B (Methodological), 1995.","journal-title":"Journal of the Royal statistical society: series B (Methodological)"},{"key":"e_1_3_2_1_4_1","first-page":"214","volume-title":"6.1 Definition of a message authentication code","author":"Boneh D.","year":"2020","unstructured":"D. Boneh and V. Shoup. 6.1 Definition of a message authentication code, pages 214--217. Version 0.5 edition, 2020."},{"key":"e_1_3_2_1_5_1","volume-title":"Evaluating large language models trained on code. https:\/\/arxiv.org\/abs\/2107.03374","author":"Chen M.","year":"2021","unstructured":"M. Chen, J. Tworek, H. Jun, Q. Yuan, H. P. de Oliveira Pinto, J. Kaplan, H. Edwards, Y. Burda, N. Joseph, G. Brockman, A. Ray, R. Puri, G. Krueger, M. Petrov, H. Khlaaf, G. Sastry, P. Mishkin, B. Chan, S. Gray, N. Ryder, M. Pavlov, A. Power, L. Kaiser, M. Bavarian, C. Winter, P. Tillet, F. P. Such, D. Cummings, M. Plappert, F. Chantzis, E. Barnes, A. Herbert-Voss, W. H. Guss, A. Nichol, A. Paino, N. Tezak, J. Tang, I. Babuschkin, S. Balaji, S. Jain, W. Saunders, C. Hesse, A. N. Carr, J. Leike, J. Achiam, V. Misra, E. Morikawa, A. Radford, M. Knight, M. Brundage, M. Murati, K. Mayer, P. Welinder, B. McGrew, D. Amodei, S. McCandlish, I. Sutskever, and W. Zaremba. Evaluating large language models trained on code. https:\/\/arxiv.org\/abs\/2107.03374, 2021."},{"key":"e_1_3_2_1_6_1","volume-title":"Educational and Psychological Measurement","author":"Cohen J.","year":"1960","unstructured":"J. Cohen. A coefficient of agreement for nominal scales. Educational and Psychological Measurement, 1960."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380387"},{"key":"e_1_3_2_1_8_1","volume-title":"A static analyzer for java, c, c, and objective-c. https:\/\/github.com\/facebook\/infer","author":"Facebook F.","year":"2022","unstructured":"F. Facebook. Facebook\/infer: A static analyzer for java, c, c, and objective-c. https:\/\/github.com\/facebook\/infer, 2022."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511861.3511863"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.31"},{"key":"e_1_3_2_1_11_1","volume-title":"Incoder: A generative model for code infilling and synthesis. https:\/\/arxiv.org\/abs\/2204.05999","author":"Fried D.","year":"2022","unstructured":"D. Fried, A. Aghajanyan, J. Lin, S. Wang, E. Wallace, F. Shi, R. Zhong, W.-t. Yih, L. Zettlemoyer, and M. Lewis. Incoder: A generative model for code infilling and synthesis. https:\/\/arxiv.org\/abs\/2204.05999, 2022."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501870"},{"key":"e_1_3_2_1_13_1","author":"Kr\u00fcger S.","year":"2021","unstructured":"S. Kr\u00fcger, J. Sp\u00e4th, K. Ali, E. Bodden, and M. Mezini. Crysl: An extensible approach to validating the correct usage of cryptographic apis. IEEE Transactions on Software Engineering, 2021.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3315508.3329975"},{"key":"e_1_3_2_1_15_1","volume-title":"ASE '15","author":"Martie L.","year":"2015","unstructured":"L. Martie, T. D. LaToza, and A. van der Hoek. Codeexchange: Supporting reformulation of internet-scale code queries in context. ASE '15, 2015."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies","author":"Pang B.","year":"2011","unstructured":"B. Pang and R. Kumar. Search in the lost sense of \"query\": Question formulation in web search queries and its temporal changes. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833571"},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Learning Representations","author":"Poesia G.","year":"2022","unstructured":"G. Poesia, A. Polozov, V. Le, A. Tiwari, G. Soares, C. Meek, and S. Gulwani. Synchromesh: Reliable code generation from pre-trained language models. In International Conference on Learning Representations, 2022."},{"key":"e_1_3_2_1_19_1","volume-title":"RFC Editor","author":"Pornin T.","year":"2013","unstructured":"T. Pornin. Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA). RFC 6979, RFC Editor, August 2013."},{"key":"e_1_3_2_1_20_1","volume-title":"Automatic program repair with openai's codex: Evaluating quixbugs. https:\/\/arxiv.org\/abs\/2111.03922","author":"Prenner J. A.","year":"2021","unstructured":"J. A. Prenner and R. Robbes. Automatic program repair with openai's codex: Evaluating quixbugs. https:\/\/arxiv.org\/abs\/2111.03922, 2021."},{"key":"e_1_3_2_1_21_1","volume-title":"Security implications of large language model code assistants: A user study. https:\/\/arxiv. org\/abs\/2208.09727","author":"Sandoval G.","year":"2022","unstructured":"G. Sandoval, H. Pearce, T. Nys, R. Karri, B. Dolan-Gavitt, and S. Garg. Security implications of large language model code assistants: A user study. https:\/\/arxiv. org\/abs\/2208.09727, 2022."},{"key":"e_1_3_2_1_22_1","volume-title":"What is it like to program with artificial intelligence? https:\/\/arxiv.org\/abs\/2208.06213","author":"Sarkar A.","year":"2022","unstructured":"A. Sarkar, A. D. Gordon, C. Negreanu, C. Poelitz, S. S. Ragavan, and B. Zorn. What is it like to program with artificial intelligence? https:\/\/arxiv.org\/abs\/2208.06213, 2022."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176344136"},{"key":"e_1_3_2_1_24_1","volume-title":"https:\/\/spotbugs.github.io\/","year":"2022","unstructured":"spotbugs. Spotbugs. https:\/\/spotbugs.github.io\/, 2022."},{"key":"e_1_3_2_1_25_1","volume-title":"Jul","author":"Tabachnyk M.","year":"2022","unstructured":"M. Tabachnyk and S. Nikolov. Ml-enhanced code completion improves developer productivity. https:\/\/ai.googleblog.com\/2022\/07\/ml-enhanced-code-completionimproves.html, Jul 2022."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519665"},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX Security Symposium","author":"Votipka D.","year":"2020","unstructured":"D. Votipka, K. R. Fulton, J. Parker, M. Hou, M. L. Mazurek, and M. Hicks. Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it. In USENIX Security Symposium, 2020."},{"key":"e_1_3_2_1_28_1","volume-title":"In-ide code generation from natural language: Promise and challenges. https:\/\/arxiv.org\/abs\/2101.11149","author":"Xu F. F.","year":"2021","unstructured":"F. F. Xu, B. Vasilescu, and G. Neubig. In-ide code generation from natural language: Promise and challenges. https:\/\/arxiv.org\/abs\/2101.11149, 2021."},{"key":"e_1_3_2_1_29_1","volume-title":"Productivity assessment of neural code completion. https: \/\/arxiv.org\/abs\/2205.06537","author":"Ziegler A.","year":"2022","unstructured":"A. Ziegler, E. Kalliamvakou, S. Simister, G. Sittampalam, A. Li, A. Rice, D. Rifkin, and E. Aftandilian. Productivity assessment of neural code completion. https: \/\/arxiv.org\/abs\/2205.06537, 2022."},{"key":"e_1_3_2_1_30_1","volume-title":"Fine-tuning language models from human preferences","author":"Ziegler D. M.","year":"2019","unstructured":"D. M. Ziegler, N. Stiennon, J. Wu, T. B. Brown, A. Radford, D. Amodei, P. F. Christiano, and G. Irving. Fine-tuning language models from human preferences, 2019."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623157","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:44:24Z","timestamp":1755740664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623157"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":30,"alternative-id":["10.1145\/3576915.3623157","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623157","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}