{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:43:41Z","timestamp":1760057021680,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1145\/3748273.3749202","type":"proceedings-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T16:19:34Z","timestamp":1756829974000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["LIFT: Automating Symbolic Execution Optimization with Large Language Models for AI Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0836-9597","authenticated-orcid":false,"given":"Ruoxi","family":"Wang","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8305-0841","authenticated-orcid":false,"given":"Kun","family":"Li","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3675-3461","authenticated-orcid":false,"given":"Minghui","family":"Xu","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7786-0231","authenticated-orcid":false,"given":"Yue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4437-0671","authenticated-orcid":false,"given":"Kaidi","family":"Xu","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0200-8092","authenticated-orcid":false,"given":"Chunchi","family":"Liu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Company Ltd., Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9871-9552","authenticated-orcid":false,"given":"Yinhao","family":"Xiao","sequence":"additional","affiliation":[{"name":"Guangdong University of Finance and Economics, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5912-4647","authenticated-orcid":false,"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, Shandong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3029878"},{"key":"e_1_3_2_1_2_1","volume-title":"AutoIoT: Automated IoT Platform Using Large Language Models","author":"Cheng Ye","year":"2024","unstructured":"Ye Cheng, Minghui Xu, Yue Zhang, Kun Li, Ruoxi Wang, and Lian Yang. 2024. AutoIoT: Automated IoT Platform Using Large Language Models. IEEE Internet of Things Journal (2024)."},{"key":"e_1_3_2_1_3_1","volume-title":"Say What You Mean: Natural Language Access Control with Large Language Models for Internet of Things. arXiv preprint arXiv:2505.23835","author":"Cheng Ye","year":"2025","unstructured":"Ye Cheng, Minghui Xu, Yue Zhang, Kun Li, Hao Wu, Yechao Zhang, Shaoyong Guo, Wangjie Qiu, Dongxiao Yu, and Xiuzhen Cheng. 2025. Say What You Mean: Natural Language Access Control with Large Language Models for Internet of Things. arXiv preprint arXiv:2505.23835 (2025)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397355"},{"volume-title":"Proceedings of the 38th IEEE\/ACM International Conference on Automated Software Engineering(ASE)","author":"Huang K.","key":"e_1_3_2_1_5_1","unstructured":"K. Huang, X. Meng, J. Zhang, Y. Liu, W. Wang, S. Li, and Y. Zhang. 2023. An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair. In Proceedings of the 38th IEEE\/ACM International Conference on Automated Software Engineering(ASE). Luxembourg City, Luxembourg, 612--623."},{"key":"e_1_3_2_1_6_1","volume-title":"Attention is all you need for llm-based code vulnerability localization. arXiv preprint arXiv:2410.15288","author":"Li Yue","year":"2024","unstructured":"Yue Li, Xiao Li, Hao Wu, Yue Zhang, Xiuzhen Cheng, Sheng Zhong, and Fengyuan Xu. 2024. Attention is all you need for llm-based code vulnerability localization. arXiv preprint arXiv:2410.15288 (2024)."},{"volume-title":"Proceedings of the International Conference on Learning Representations (ICLR). Online. Available: https:\/\/openreview.net\/forum?id=your-id.","author":"Li Z.","key":"e_1_3_2_1_7_1","unstructured":"Z. Li, S. Dutta, and M. Naik. 2025. IRIS: LLM-Assisted Static Analysis for Detecting Security Vulnerabilities. In Proceedings of the International Conference on Learning Representations (ICLR). Online. Available: https:\/\/openreview.net\/forum?id=your-id."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464825"},{"volume-title":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Merckx J.","key":"e_1_3_2_1_9_1","unstructured":"J. Merckx, T. Besard, and B. De Sutter. 2025. Equality Saturation for Optimizing High-Level Julia IR. In Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"volume-title":"Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation (PLDI). 89--100","author":"Nethercote N.","key":"e_1_3_2_1_10_1","unstructured":"N. Nethercote and J. Seward. 2007. Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation. In Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation (PLDI). 89--100."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS)","author":"Pitigalaarachchi P.","year":"2009","unstructured":"P. Pitigalaarachchi, X. Ding, H. Qiu, H. Tu, J. Hong, and L. Jiang. 2023. KRover: A Symbolic Execution Engine for Dynamic Kernel Analysis. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS). Copenhagen, Denmark, 2009--2023."},{"volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security). 181--198","author":"Poeplau S.","key":"e_1_3_2_1_12_1","unstructured":"S. Poeplau and A. Francillon. 2020. Symbolic Execution with SYMCC: Don't Interpret, Compile!. In Proceedings of the 29th USENIX Security Symposium (USENIX Security). 181--198."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.16"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2323977"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558926"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639121"},{"key":"e_1_3_2_1_18_1","volume-title":"On protecting the data privacy of large language models (llms): A survey. arXiv preprint arXiv:2403.05156","author":"Yan Biwei","year":"2024","unstructured":"Biwei Yan, Kun Li, Minghui Xu, Yueyan Dong, Yue Zhang, Zhaochun Ren, and Xiuzhen Cheng. 2024. On protecting the data privacy of large language models (llms): A survey. arXiv preprint arXiv:2403.05156 (2024)."},{"key":"e_1_3_2_1_19_1","volume-title":"On protecting the data privacy of Large Language Models (LLMs) and LLM agents: A literature review. High-Confidence Computing","author":"Yan Biwei","year":"2025","unstructured":"Biwei Yan, Kun Li, Minghui Xu, Yueyan Dong, Yue Zhang, Zhaochun Ren, and Xiuzhen Cheng. 2025. On protecting the data privacy of Large Language Models (LLMs) and LLM agents: A literature review. High-Confidence Computing (2025), 100300."},{"key":"e_1_3_2_1_20_1","volume-title":"A survey on large language model (llm) security and privacy: The good, the bad, and the ugly. High-Confidence Computing","author":"Yao Yifan","year":"2024","unstructured":"Yifan Yao, Jinhao Duan, Kaidi Xu, Yuanfang Cai, Zhibo Sun, and Yue Zhang. 2024. A survey on large language model (llm) security and privacy: The good, the bad, and the ugly. High-Confidence Computing (2024), 100211."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3632166"}],"event":{"name":"SIGCOMM '25: ACM SIGCOMM 2025 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Coimbra Portugal","acronym":"SIGCOMM '25"},"container-title":["Proceedings of the 2nd Workshop on Networks for AI Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3748273.3749202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T14:11:05Z","timestamp":1760019065000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3748273.3749202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":21,"alternative-id":["10.1145\/3748273.3749202","10.1145\/3748273"],"URL":"https:\/\/doi.org\/10.1145\/3748273.3749202","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]},"assertion":[{"value":"2025-09-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}