{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:09Z","timestamp":1750309329496,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":96,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62232016","62072442","62272445","62332001"],"award-info":[{"award-number":["62232016","62072442","62272445","62332001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Basic Research Program of ISCAS","award":["ISCAS-JCZD-202304"],"award-info":[{"award-number":["ISCAS-JCZD-202304"]}]},{"name":"Major Program of ISCAS","award":["ISCAS-ZD-202302"],"award-info":[{"award-number":["ISCAS-ZD-202302"]}]},{"name":"University of Queensland NSRSG","award":["NS-2201"],"award-info":[{"award-number":["NS-2201"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3694982","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1182-143X","authenticated-orcid":false,"given":"Ziyou","family":"Jiang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Intelligent Game, Science and Technology on Integrated Information System Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, China"},{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1476-7213","authenticated-orcid":false,"given":"Lin","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Software, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1404-4560","authenticated-orcid":false,"given":"Guowei","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Queensland, Brisbane, Queensland, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2618-5694","authenticated-orcid":false,"given":"Qing","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Intelligent Game, Science and Technology on Integrated Information System Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, China"},{"name":"University of Chinese Academy of Sciences, Beijing, Select one..., China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. This package contains a serious security hole. https:\/\/github.com\/skoranga\/node-dns-sync\/issues\/1."},{"key":"e_1_3_2_1_2_1","unstructured":"2015. Bedita CMS 3.6.0 - Publication Module Bug Report. https:\/\/github.com\/bedita\/bedita\/issues\/755."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. ISO\/IEC 29147:2018: Security techniques - Vulnerability disclosure. https:\/\/www.iso.org\/standard\/72311.html.."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. Possible XSS in safe_mode using incomplete tags. https:\/\/github.com\/trentm\/python-markdown2\/issues\/285."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Bugzilla. https:\/\/www.bugzilla.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2023. Common vulnerabilities and exposures. https:\/\/cve.mitre.org\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2023. Common weakness enumeration. https:\/\/cwe.mitre.org\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2023. GHArchive. https:\/\/www.gharchive.org\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"PatUntrack. 2024. PatUntrack. 10.6084\/m9.figshare.26643037","DOI":"10.6084\/m9.figshare.26643037"},{"key":"e_1_3_2_1_10_1","unstructured":"2024. CERT Guide to Coordinated Vulnerability Disclosure. https:\/\/vuls.cert.org\/confluence\/display\/CVD."},{"key":"e_1_3_2_1_11_1","unstructured":"2024. Codeium - Free AI Code Completion & Chat. https:\/\/codeium.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2024. google-t5\/t5-base. https:\/\/huggingface.co\/google-t5\/t5-base."},{"key":"e_1_3_2_1_13_1","unstructured":"2024. Wapiti - A simple and fast discriminative sequence labelling toolkit. https:\/\/wapiti.limsi.fr\/."},{"key":"e_1_3_2_1_14_1","unstructured":"2024. Zed Attack Proxy. https:\/\/www.zaproxy.org\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328718"},{"key":"e_1_3_2_1_16_1","unstructured":"Atlassian. 2023. Jira | Issue & Project Tracking Software. https:\/\/www.atlassian.com\/software\/jira."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023","author":"Chen Yizheng","year":"2023","unstructured":"Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, and David A. Wagner. 2023. DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16--18, 2023. ACM, 654--668."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3192419"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3639477.3639738"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639184"},{"key":"e_1_3_2_1_22_1","unstructured":"T. M. Corporation. 2011. Common Attack Pattern Enumeration and Classification (CAPEC). http:\/\/capec.mitre.org\/ (2011)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110460"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_25_1","unstructured":"Explosion. 2022. Spacy. https:\/\/www.spacy.io\/."},{"key":"e_1_3_2_1_26_1","volume-title":"LLM Agents can Autonomously Exploit One-day Vulnerabilities. CoRR abs\/2404.08144","author":"Fang Richard","year":"2024","unstructured":"Richard Fang, Rohan Bindu, Akul Gupta, and Daniel Kang. 2024. LLM Agents can Autonomously Exploit One-day Vulnerabilities. CoRR abs\/2404.08144 (2024)."},{"key":"e_1_3_2_1_27_1","volume-title":"CodeBERT: A Pre-Trained Model for Programming and Natural Languages. In Findings of the Association for Computational Linguistics: EMNLP 2020, Online Event, 16--20 November 2020 (Findings of ACL","volume":"1547","author":"Feng Zhangyin","year":"2020","unstructured":"Zhangyin Feng, Daya Guo, Duyu Tang, Nan Duan, Xiaocheng Feng, Ming Gong, Linjun Shou, Bing Qin, Ting Liu, Daxin Jiang, and Ming Zhou. 2020. CodeBERT: A Pre-Trained Model for Programming and Natural Languages. In Findings of the Association for Computational Linguistics: EMNLP 2020, Online Event, 16--20 November 2020 (Findings of ACL, Vol. EMNLP 2020), Trevor Cohn, Yulan He, and Yang Liu (Eds.). Association for Computational Linguistics, 1536--1547."},{"key":"e_1_3_2_1_28_1","volume-title":"InCoder: A Generative Model for Code Infilling and Synthesis. In The Eleventh International Conference on Learning Representations, ICLR 2023","author":"Fried Daniel","year":"2023","unstructured":"Daniel Fried, Armen Aghajanyan, Jessy Lin, Sida Wang, Eric Wallace, Freda Shi, Ruiqi Zhong, Scott Yih, Luke Zettlemoyer, and Mike Lewis. 2023. InCoder: A Generative Model for Code Infilling and Synthesis. In The Eleventh International Conference on Learning Representations, ICLR 2023, Kigali, Rwanda, May 1--5, 2023."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463340"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092566"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2019, Dongmei Zhang and Anders M\u00f8ller (Eds.). ACM, 19--30","author":"Ghanbari Ali","year":"2019","unstructured":"Ali Ghanbari, Samuel Benton, and Lingming Zhang. 2019. Practical program repair via bytecode mutation. In Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2019, Dongmei Zhang and Anders M\u00f8ller (Eds.). ACM, 19--30."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00116"},{"key":"e_1_3_2_1_33_1","volume-title":"Art Manion, and Chris King","author":"Householder Allen D","year":"2017","unstructured":"Allen D Householder, Garret Wassermann, Art Manion, and Chris King. 2017. The cert guide to coordinated vulnerability disclosure. Software Engineering Institute, Pittsburgh, PA (2017)."},{"key":"e_1_3_2_1_34_1","volume-title":"Taxonomy, Challenges, and Open Questions. CoRR abs\/2311.05232","author":"Huang Lei","year":"2023","unstructured":"Lei Huang, Weijiang Yu, Weitao Ma, Weihong Zhong, Zhangyin Feng, Haotian Wang, Qianglong Chen, Weihua Peng, Xiaocheng Feng, Bing Qin, and Ting Liu. 2023. A Survey on Hallucination in Large Language Models: Principles, Taxonomy, Challenges, and Open Questions. CoRR abs\/2311.05232 (2023)."},{"key":"e_1_3_2_1_35_1","volume-title":"ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions. In IEEE Symposium on Security and Privacy, SP","author":"Jang Jiyong","year":"2012","unstructured":"Jiyong Jang, Abeer Agrawal, and David Brumley. 2012. ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions. In IEEE Symposium on Security and Privacy, SP 2012. IEEE Computer Society, 48--62."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Tiantian Ji Yue Wu Chang Wang Xi Zhang and Zhongru Wang. 2018. The coming era of alphahacking?: A survey of automatic software vulnerability detection exploitation and patching techniques. In 2018 IEEE third international conference on data science in cyberspace (DSC). IEEE 53--60.","DOI":"10.1109\/DSC.2018.00017"},{"key":"e_1_3_2_1_37_1","volume-title":"CURE: Code-Aware Neural Machine Translation for Automatic Program Repair. In 43rd IEEE\/ACM International Conference on Software Engineering, ICSE","author":"Jiang Nan","year":"2021","unstructured":"Nan Jiang, Thibaud Lutellier, and Lin Tan. 2021. CURE: Code-Aware Neural Machine Translation for Automatic Program Repair. In 43rd IEEE\/ACM International Conference on Software Engineering, ICSE 2021. IEEE, 1161--1173."},{"volume-title":"Survey on software vulnerability analysis method based on machine learning. In 2016 IEEE first international conference on data science in cyberspace (DSC)","author":"Jie Gong","key":"e_1_3_2_1_38_1","unstructured":"Gong Jie, Kuang Xiao-Hui, and Liu Qiang. 2016. Survey on software vulnerability analysis method based on machine learning. In 2016 IEEE first international conference on data science in cyberspace (DSC). IEEE, 642--647."},{"key":"e_1_3_2_1_39_1","volume-title":"Demystifying the Mysteries of Security Vulnerability Discussions on Developer Q&A Sites. CoRR abs\/2008.04176","author":"Minh Le Triet Huynh","year":"2020","unstructured":"Triet Huynh Minh Le, Roland Croft, David Hin, and Muhammad Ali Babar. 2020. Demystifying the Mysteries of Security Vulnerability Discussions on Developer Q&A Sites. CoRR abs\/2008.04176 (2020)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Triet Huynh Minh Le Roland Croft David Hin and Muhammad Ali Babar. 2021. A Large-Scale Study of Security Vulnerability Support on Developer Q&A Websites. In Evaluation and assessment in software engineering. 109--118.","DOI":"10.1145\/3463274.3463331"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416627"},{"key":"e_1_3_2_1_42_1","volume-title":"Bosheng Ding, Lidong Bing, Shafiq R. Joty, and Soujanya Poria.","author":"Li Xingxuan","year":"2023","unstructured":"Xingxuan Li, Ruochen Zhao, Yew Ken Chia, Bosheng Ding, Lidong Bing, Shafiq R. Joty, and Soujanya Poria. 2023. Chain of Knowledge: A Framework for Grounding Large Language Models with Structured Knowledge Bases. CoRR abs\/2305.13269 (2023)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"e_1_3_2_1_44_1","volume-title":"VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS.","author":"Li Zhen","year":"2018","unstructured":"Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, and Yuyi Zhong. 2018. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2016.7515932"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138840"},{"volume-title":"Software vulnerability discovery techniques: A survey. In 2012 fourth international conference on multimedia information networking and security","author":"Liu Bingchang","key":"e_1_3_2_1_48_1","unstructured":"Bingchang Liu, Liang Shi, Zhuhua Cai, and Min Li. 2012. Software vulnerability discovery techniques: A survey. In 2012 fourth international conference on multimedia information networking and security. IEEE, 152--156."},{"volume-title":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2019, Dongmei Zhang and Anders M\u00f8ller (Eds.). ACM, 31--42","author":"Liu Kui","key":"e_1_3_2_1_49_1","unstructured":"Kui Liu, Anil Koyuncu, Dongsun Kim, and Tegawend\u00e9 F. Bissyand\u00e9. 2019. TBar: revisiting template-based automated program repair. In Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2019, Dongmei Zhang and Anders M\u00f8ller (Eds.). ACM, 31--42."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397369"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.023"},{"volume-title":"Pragmatic Characteristics of Security Conversations: An Exploratory Linguistic Analysis","author":"Meyers Benjamin S","key":"e_1_3_2_1_52_1","unstructured":"Benjamin S Meyers, Nuthan Munaiah, Andrew Meneely, and Emily Prud'hommeaux. 2019. Pragmatic Characteristics of Security Conversations: An Exploratory Linguistic Analysis. In CHASE. IEEE, 79--82."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.emnlp-main.759"},{"key":"e_1_3_2_1_54_1","unstructured":"MITRE. 2024. CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). https:\/\/cwe.mitre.org\/data\/definitions\/78.html."},{"key":"e_1_3_2_1_55_1","volume-title":"Information-theoretic Source Code Vulnerability Highlighting. In International Joint Conference on Neural Networks, IJCNN","author":"Nguyen Van","year":"2021","unstructured":"Van Nguyen, Trung Le, Olivier Y. de Vel, Paul Montague, John Grundy, and Dinh Phung. 2021. Information-theoretic Source Code Vulnerability Highlighting. In International Joint Conference on Neural Networks, IJCNN 2021. IEEE, 1--8."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055301.3068754"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224924"},{"key":"e_1_3_2_1_58_1","volume-title":"Chatgpt: A language model for conversational AI. https:\/\/www.openai.com\/research\/chatgpt\/.","author":"AI.","year":"2023","unstructured":"OpenAI. 2023. Chatgpt: A language model for conversational AI. https:\/\/www.openai.com\/research\/chatgpt\/."},{"key":"e_1_3_2_1_59_1","unstructured":"OpenAI. 2024. GPT35Models. https:\/\/platform.openai.com\/docs\/models\/gpt-3-5."},{"key":"e_1_3_2_1_60_1","unstructured":"OpenAI. 2024. GPT3Models. https:\/\/platform.openai.com\/docs\/models\/gpt-3."},{"key":"e_1_3_2_1_61_1","unstructured":"OWASP. 2023. Open web application security project. https:\/\/www.owasp.org\/index.php\/MainPage."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-020-09546-7"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.2495\/SAFE-V6-N2-270-281"},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2022","author":"Pan Shengyi","year":"2022","unstructured":"Shengyi Pan, Jiayuan Zhou, Filipe Roseiro Cogo, Xin Xia, Lingfeng Bao, Xing Hu, Shanping Li, and Ahmed E. Hassan. 2022. Automated unearthing of dangerous issue reports. In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2022, Singapore, Singapore, November 14--18, 2022. ACM, 834--846."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110657"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2787653"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597117"},{"key":"e_1_3_2_1_68_1","volume-title":"DeepLink: Recovering issue-commit links based on deep learning. J. Syst. Softw. 158","author":"Ruan Hang","year":"2019","unstructured":"Hang Ruan, Bihuan Chen, Xin Peng, and Wenyun Zhao. 2019. DeepLink: Recovering issue-commit links based on deep learning. J. Syst. Softw. 158 (2019)."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0394.00045"},{"key":"e_1_3_2_1_70_1","volume-title":"Automated Vulnerability Detection in Source Code Using Deep Representation Learning. In 17th IEEE International Conference on Machine Learning and Applications, ICMLA 2018","author":"Russell Rebecca L.","year":"2018","unstructured":"Rebecca L. Russell, Louis Y. Kim, Lei H. Hamilton, Tomo Lazovich, Jacob Harer, Onur Ozdemir, Paul M. Ellingwood, and Marc W. McConley. 2018. Automated Vulnerability Detection in Source Code Using Deep Representation Learning. In 17th IEEE International Conference on Machine Learning and Applications, ICMLA 2018, Orlando, FL, USA, December 17--20, 2018. IEEE, 757--762."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2340398"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678894"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.346"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09906-8"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(73)90006-4"},{"key":"e_1_3_2_1_77_1","unstructured":"Tencent. 2023. OCR | Tencent Cloud. https:\/\/www.tencentcloud.com\/document\/product\/1045\/49147."},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, ESEM","author":"Walden James","year":"2009","unstructured":"James Walden, Maureen Doyle, Grant A. Welch, and Michael Whelan. 2009. Security of open source web applications. In Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, ESEM 2009. IEEE Computer Society, 545--553."},{"key":"e_1_3_2_1_79_1","volume-title":"DefectHunter: A Novel LLM-Driven Boosted-Conformer-based Code Vulnerability Detection Mechanism. CoRR abs\/2309.15324","author":"Wang Jin","year":"2023","unstructured":"Jin Wang, Zishan Huang, Hengli Liu, Nianyi Yang, and Yinhao Xiao. 2023. DefectHunter: A Novel LLM-Driven Boosted-Conformer-based Code Vulnerability Detection Mechanism. CoRR abs\/2309.15324 (2023)."},{"key":"e_1_3_2_1_80_1","volume-title":"PatchDB: A Large-Scale Security Patch Dataset. In 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN","author":"Wang Xinda","year":"2021","unstructured":"Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, and Sushil Jajodia. 2021. PatchDB: A Large-Scale Security Patch Dataset. In 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2021. IEEE, 149--160."},{"key":"e_1_3_2_1_81_1","volume-title":"Hoi","author":"Wang Yue","year":"2023","unstructured":"Yue Wang, Hung Le, Akhilesh Gotmare, Nghi D. Q. Bui, Junnan Li, and Steven C. H. Hoi. 2023. CodeT5+: Open Code Large Language Models for Code Understanding and Generation. In Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, EMNLP 2023, Houda Bouamor, Juan Pino, and Kalika Bali (Eds.). Association for Computational Linguistics, 1069--1088."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2014.7049035"},{"key":"e_1_3_2_1_83_1","volume-title":"Mining Bug Databases for Unidentified Software Vulnerabilities. In 2012 5th International Conference on Human System Interactions","author":"Wijayasekara Dumidu","year":"2012","unstructured":"Dumidu Wijayasekara, Milos Manic, Jason L. Wright, and Miles McQueen. 2012. Mining Bug Databases for Unidentified Software Vulnerabilities. In 2012 5th International Conference on Human System Interactions, Perth, Australia, June 6--8, 2012. IEEE, 89--96."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416562"},{"key":"e_1_3_2_1_85_1","volume-title":"Automated Program Repair in the Era of Large Pre-trained Language Models. In 45th IEEE\/ACM International Conference on Software Engineering, ICSE","author":"Xia Chunqiu Steven","year":"2023","unstructured":"Chunqiu Steven Xia, Yuxiang Wei, and Lingming Zhang. 2023. Automated Program Repair in the Era of Large Pre-trained Language Models. In 45th IEEE\/ACM International Conference on Software Engineering, ICSE 2023. IEEE, 1482--1494."},{"key":"e_1_3_2_1_86_1","volume-title":"Keep the Conversation Going: Fixing 162 out of 337 bugs for $0.42 each using ChatGPT. CoRR abs\/2304.00385","author":"Xia Chunqiu Steven","year":"2023","unstructured":"Chunqiu Steven Xia and Lingming Zhang. 2023. Keep the Conversation Going: Fixing 162 out of 337 bugs for $0.42 each using ChatGPT. CoRR abs\/2304.00385 (2023)."},{"key":"e_1_3_2_1_87_1","volume-title":"PUMM: Preventing Use-After-Free Using Execution Unit Partitioning. In 32nd USENIX Security Symposium, USENIX Security","author":"Yagemann Carter","year":"2023","unstructured":"Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, and Wenke Lee. 2023. PUMM: Preventing Use-After-Free Using Execution Unit Partitioning. In 32nd USENIX Security Symposium, USENIX Security 2023, Joseph A. Calandrino and Carmela Troncoso (Eds.). USENIX Association, 823--840."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516665"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1672-0"},{"key":"e_1_3_2_1_90_1","volume-title":"Neural Program Repair with Execution-based Backpropagation. In 44th IEEE\/ACM 44th International Conference on Software Engineering, ICSE 2022. ACM, 1506--1518","author":"Ye He","year":"2022","unstructured":"He Ye, Matias Martinez, and Martin Monperrus. 2022. Neural Program Repair with Execution-based Backpropagation. In 44th IEEE\/ACM 44th International Conference on Software Engineering, ICSE 2022. ACM, 1506--1518."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-emnlp.192"},{"key":"e_1_3_2_1_92_1","volume-title":"Muhammad Ali Babar, and Christoph Treude","author":"Zahedi Mansooreh","year":"2018","unstructured":"Mansooreh Zahedi, Muhammad Ali Babar, and Christoph Treude. 2018. An Empirical Study of Security Issues Posted in Open Source Projects. In HICSS. ScholarSpace \/ AIS Electronic Library (AISeL), 1--10."},{"key":"e_1_3_2_1_93_1","volume-title":"EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery. In 38th IEEE\/ACM International Conference on Automated Software Engineering, ASE","author":"Zhang Chenyuan","year":"2023","unstructured":"Chenyuan Zhang, Yanlin Wang, Zhao Wei, Yong Xu, Juhong Wang, Hui Li, and Rongrong Ji. 2023. EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery. In 38th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2023. IEEE, 217--229."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00020"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"crossref","unstructured":"Qihao Zhu Zeyu Sun Yuan-an Xiao Wenjie Zhang Kang Yuan Yingfei Xiong and Lu Zhang. 2021. A syntax-guided edit decoder for neural program repair. In ESEC\/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering Diomidis Spinellis Georgios Gousios Marsha Chechik and Massimiliano Di Penta (Eds.). ACM 341--353.","DOI":"10.1145\/3468264.3468544"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-08046-y"}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Sacramento CA USA","acronym":"ASE '24"},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3694982","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3694982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:06Z","timestamp":1750291446000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3694982"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":96,"alternative-id":["10.1145\/3691620.3694982","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3694982","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}