{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:17:28Z","timestamp":1769915848884,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Huawei Technologies Co., Ltd.","award":["9458477"],"award-info":[{"award-number":["9458477"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3691374","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4940-4942","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Poster: An Exploration of Large Language Models in Malicious Source Code Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2324-0239","authenticated-orcid":false,"given":"Di","family":"Xue","sequence":"first","affiliation":[{"name":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5143-9272","authenticated-orcid":false,"given":"Gang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2947-1564","authenticated-orcid":false,"given":"Zhongqi","family":"Fan","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4073-0801","authenticated-orcid":false,"given":"Wei","family":"Li","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3772-3282","authenticated-orcid":false,"given":"Yahong","family":"Xu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7119-8516","authenticated-orcid":false,"given":"Zhen","family":"Liu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9549-7042","authenticated-orcid":false,"given":"Yin","family":"Liu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0541-7505","authenticated-orcid":false,"given":"Zhongliang","family":"Yuan","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd., Shenzhen, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1877","article-title":"Language Models are Few-Shot Learners","volume":"33","author":"Brown Tom","year":"2020","unstructured":"Tom Brown, Benjamin Mann, Nick Ryder, and Melanie Subbiah. 2020. Language Models are Few-Shot Learners. In Advances in Neural Information Processing Systems, Vol. 33. 1877--1901.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_2_1","volume-title":"malicious software packages dataset. https:\/\/github.com\/DataDog\/malicious-software-packages-dataset Retrieved june 16","year":"2024","unstructured":"DataDog. 2024. malicious software packages dataset. https:\/\/github.com\/DataDog\/malicious-software-packages-dataset Retrieved june 16, 2024 from"},{"key":"e_1_3_2_1_3_1","first-page":"3493","article-title":"Better Zero-Shot Reasoning with Role-Play Prompting","volume":"2023","author":"Kong Aobo","year":"2023","unstructured":"Aobo Kong, Shiwan Zhao, Hao Chen, Qicheng Li, Yong Qin, Ruiqi Sun, and Xin Zhou. 2023. Better Zero-Shot Reasoning with Role-Play Prompting. In Findings of the Association for Computational Linguistics: ACL 2023. 3493--3514.","journal-title":"Findings of the Association for Computational Linguistics: ACL"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3484491"},{"key":"e_1_3_2_1_5_1","unstructured":"Debjyoti Mondal Suraj Modi Subhadarshi Panda Rituraj Singh and Godawari Sudhakar Rao. 2024. KAM-CoT: Knowledge Augmented Multimodal Chain-of-Thoughts Reasoning. arxiv: 2401.12863 https:\/\/arxiv.org\/abs\/2401.12863"},{"key":"e_1_3_2_1_6_1","volume-title":"2023 Sonatype- 9th Annual State of the Software Supply Chain. 2023 Sonatype- 9th Annual State of the Software Supply Chain Retrieved june 2","year":"2024","unstructured":"Sonatype. 2024. 2023 Sonatype- 9th Annual State of the Software Supply Chain. 2023 Sonatype- 9th Annual State of the Software Supply Chain Retrieved june 2, 2024 from"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"e_1_3_2_1_8_1","unstructured":"Wayne Xin Zhao Kun Zhou Junyi Li Tianyi Tang Xiaolei Wang Yupeng Hou Yingqian Min Beichen Zhang Junjie Zhang Zican Dong Yifan Du Chen Yang Yushuo Chen Zhipeng Chen Jinhao Jiang Ruiyang Ren Yifan Li Xinyu Tang Zikang Liu Peiyu Liu Jian-Yun Nie and Ji-Rong Wen. 2023. A Survey of Large Language Models. arxiv: 2303.18223 https:\/\/arxiv.org\/abs\/2303.18223"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691374","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3691374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:18:12Z","timestamp":1755843492000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691374"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":8,"alternative-id":["10.1145\/3658644.3691374","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3691374","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}