{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:47:12Z","timestamp":1773330432514,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T00:00:00Z","timestamp":1707177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/P009301\/1"],"award-info":[{"award-number":["EP\/P009301\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,2,6]]},"DOI":"10.1145\/3597503.3623312","type":"proceedings-article","created":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T20:53:16Z","timestamp":1707252796000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["DocFlow: Extracting Taint Specifications from Software Documentation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6748-2243","authenticated-orcid":false,"given":"Marcos","family":"Tileria","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4392-9023","authenticated-orcid":false,"given":"Jorge","family":"Blasco","sequence":"additional","affiliation":[{"name":"Universidad Politecnica de Madrid, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5674-8531","authenticated-orcid":false,"given":"Santanu Kumar","family":"Dash","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,2,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359591.3359735"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212695"},{"key":"e_1_3_2_1_3_1","volume-title":"Practical statistics for medical research","author":"Altman Douglas G","unstructured":"Douglas G Altman. 1990. Practical statistics for medical research. CRC press."},{"key":"e_1_3_2_1_4_1","volume-title":"Maged Saeed AlShaibani, and Irfan Ahmad","author":"Alyafeai Zaid","year":"2020","unstructured":"Zaid Alyafeai, Maged Saeed AlShaibani, and Irfan Ahmad. 2020. A survey on transfer learning in natural language processing. arXiv preprint arXiv:2007.04239."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.002"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196449"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377816.3381720"},{"key":"e_1_3_2_1_10_1","unstructured":"Daniel Cer et al. 2018. Universal sentence encoder. arXiv preprint arXiv:1803.11175."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666357.2597823"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314648"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236042"},{"key":"e_1_3_2_1_15_1","unstructured":"Jacob Devlin Ming-Wei Chang Kenton Lee and Kristina Toutanova. 2018. Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"key":"e_1_3_2_1_17_1","volume-title":"International conference on security and privacy in communication systems. Springer, 172--192","author":"Shuaike","unstructured":"Shuaike Dong et al. 2018. Understanding android obfuscation techniques: a large-scale investigation in the wild. In International conference on security and privacy in communication systems. Springer, 172--192."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314640"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Joseph L Fleiss. 1971. Measuring nominal scale agreement among many raters. Psychological bulletin 76 5 378.","DOI":"10.1037\/h0031619"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338943"},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved","year":"2023","unstructured":"Google. 2023. Android blog. Retrieved Feb. 15, 2023 from https:\/\/www.blog.google\/products\/android\/android-12-beta\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","year":"2023","unstructured":"Google. 2023. Android contributing page. Retrieved Feb. 15, 2023 from https:\/\/source.android.com\/docs\/setup\/contribute\/code-style."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950334"},{"key":"e_1_3_2_1_26_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G Shin, and Karl Aberer. 2018. Polisis: automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium (USENIX Security 18), 531--548."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Qing Huang Yanbang Sun Zhenchang Xing Min Yu Xiwei Xu and Qinghua Lu. 2023. Api entity and relation joint extraction from text via dynamic prompt-tuned language model. ACM Transactions on Software Engineering and Methodology. Just Accepted.","DOI":"10.1145\/3607188"},{"key":"e_1_3_2_1_28_1","unstructured":"Hamel Husain Ho-Hsiang Wu Tiferet Gazit Miltiadis Allamanis and Marc Brockschmidt. 2019. Codesearchnet challenge: evaluating the state of semantic code search. arXiv preprint arXiv:1909.09436."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470133"},{"key":"e_1_3_2_1_30_1","volume-title":"Identifying and characterizing silently-evolved methods in the android api. in 2021 ieee\/acm 43rd international conference on software engineering: software engineering in practice (icse-seip","author":"Liu Pei","year":"2021","unstructured":"Pei Liu, Li Li, Yichun Yan, Mattia Fazzini, and John Grundy. 2021. Identifying and characterizing silently-evolved methods in the android api. in 2021 ieee\/acm 43rd international conference on software engineering: software engineering in practice (icse-seip 2021). (2021)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Pengfei Liu Weizhe Yuan Jinlan Fu Zhengbao Jiang Hiroaki Hayashi and Graham Neubig. 2023. Pre-train prompt and predict: a systematic survey of prompting methods in natural language processing. 55 9 Article 195 35 pages.","DOI":"10.1145\/3560815"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2018.8506574"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542485"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.18"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21373-2_14"},{"key":"e_1_3_2_1_36_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781."},{"key":"e_1_3_2_1_37_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. Advances in neural information processing systems 26."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510079"},{"key":"e_1_3_2_1_39_1","unstructured":"OpenAI. 2023. Gpt-4 technical report. (2023). arXiv: 2303.08774 [cs.CL]."},{"key":"e_1_3_2_1_40_1","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Pandita Rahul","year":"2013","unstructured":"Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. {Whyper}: towards automating risk assessment of mobile applications. In 22nd USENIX Security Symposium (USENIX Security 13), 527--542."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409693"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380440"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Matthew E Peters Sebastian Ruder and Noah A Smith. 2019. To tune or not to tune? adapting pretrained representations to diverse tasks. arXiv preprint arXiv:1903.05987.","DOI":"10.18653\/v1\/W19-4302"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2013.14"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330556"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10165-y"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_1_49_1","volume-title":"Retrieved","author":"Reimers Nils","year":"2023","unstructured":"Nils Reimers. 2023. Sbert pretrained models. Retrieved Feb. 15, 2023 from https:\/\/www.sbert.net\/docs\/pretrained_models.html."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Nils Reimers and Iryna Gurevych. 2019. Sentence-bert: sentence embeddings using siamese bert-networks. arXiv preprint arXiv:1908.10084.","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_1_51_1","volume-title":"How to fine-tune bert for text classification? In China national conference on Chinese computational linguistics","author":"Sun Chi","unstructured":"Chi Sun, Xipeng Qiu, Yige Xu, and Xuanjing Huang. 2019. How to fine-tune bert for text classification? In China national conference on Chinese computational linguistics. Springer, 194--206."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0092"},{"key":"e_1_3_2_1_53_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Tileria Marcos","year":"2020","unstructured":"Marcos Tileria, Jorge Blasco, and Guillermo Suarez-Tangil. 2020. Wearflow: expanding information flow analysis to companion apps in wear os. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), 63--75."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the 38th International Conference on Software Engineering (ICSE '16)","author":"Treude Christoph","unstructured":"Christoph Treude and Martin P. Robillard. 2016. Augmenting api documentation with insights from stack overflow. In Proceedings of the 38th International Conference on Software Engineering (ICSE '16), 392--403."},{"key":"e_1_3_2_1_55_1","first-page":"11","article-title":"Visualizing data using t-sne","volume":"9","author":"der Maaten Laurens Van","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-sne. Journal of machine learning research, 9, 11.","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1101"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen:20070110"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.78"},{"key":"e_1_3_2_1_59_1","volume-title":"Api method recommendation via explicit matching of functionality verb phrases. In (ESEC\/FSE","author":"Xie Wenkai","year":"2020","unstructured":"Wenkai Xie, Xin Peng, Mingwei Liu, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang, and Wenyun Zhao. 2020. Api method recommendation via explicit matching of functionality verb phrases. In (ESEC\/FSE 2020), 1015--1026."},{"key":"e_1_3_2_1_60_1","unstructured":"Wenpeng Yin Jamaal Hay and Dan Roth. 2019. Benchmarking zero-shot text classification: datasets evaluation and entailment approach. arXiv preprint arXiv:1909.00161."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884881"},{"key":"e_1_3_2_1_62_1","article-title":"Slowing down the aging of learning-based malware detectors with api knowledge","author":"Zhang Xiaohan","year":"2022","unstructured":"Xiaohan Zhang, Mi Zhang, Yuan Zhang, Ming Zhong, Xin Zhang, Yinzhi Cao, and Min Yang. 2022. Slowing down the aging of learning-based malware detectors with api knowledge. IEEE Transactions on Dependable and Secure Computing.","journal-title":"IEEE Transactions on Dependable and Secure Computing."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"}],"event":{"name":"ICSE '24: IEEE\/ACM 46th International Conference on Software Engineering","location":"Lisbon Portugal","acronym":"ICSE '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"]},"container-title":["Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3623312","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597503.3623312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:45Z","timestamp":1750182525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3623312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,6]]},"references-count":62,"alternative-id":["10.1145\/3597503.3623312","10.1145\/3597503"],"URL":"https:\/\/doi.org\/10.1145\/3597503.3623312","relation":{},"subject":[],"published":{"date-parts":[[2024,2,6]]},"assertion":[{"value":"2024-02-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}