{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T17:23:34Z","timestamp":1763054614353,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2247687,CNS-2312346"],"award-info":[{"award-number":["CNS-2247687,CNS-2312346"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001124C0486"],"award-info":[{"award-number":["HR001124C0486"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3766882.3767171","type":"proceedings-article","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T13:55:02Z","timestamp":1759326902000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Guarding LLM-aided Software Transformation Tasks via Component Exoskeletons"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1989-3922","authenticated-orcid":false,"given":"Evangelos","family":"Lamprou","sequence":"first","affiliation":[{"name":"Brown University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1947-7928","authenticated-orcid":false,"given":"Christian Gram","family":"Kalhauge","sequence":"additional","affiliation":[{"name":"Technical University of Denmark, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8095-8523","authenticated-orcid":false,"given":"Martin C.","family":"Rinard","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7347-298X","authenticated-orcid":false,"given":"Nikos","family":"Vasilakis","sequence":"additional","affiliation":[{"name":"Brown University, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2006. CVE-2006-3400. National Vulnerability Database (NVD) U.S. NIST. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2006-3400"},{"key":"e_1_3_2_1_2_1","unstructured":"2019. CVE-2019-1010043. National Vulnerability Database (NVD) U.S. NIST. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-1010043"},{"key":"e_1_3_2_1_3_1","unstructured":"2025. npm. https:\/\/www.npmjs.com."},{"key":"e_1_3_2_1_4_1","unstructured":"2025. Python Package Index (PyPI). https:\/\/pypi.org."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517208.3523753"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3495724.3495883"},{"key":"e_1_3_2_1_7_1","unstructured":"Wikipedia contributors. 1999. Fast Inverse Square Root Algorithm. https:\/\/en.wikipedia.org\/wiki\/Fast_inverse_square_root."},{"key":"e_1_3_2_1_8_1","volume-title":"Towards translating real-world code with LLMs: A study of translating to Rust. arXiv preprint arXiv:2405.11514","author":"Eniser Hasan Ferit","year":"2024","unstructured":"Hasan Ferit Eniser, Hanliang Zhang, Cristina David, Meng Wang, Maria Christakis, Brandon Paulsen, Joey Dodds, and Daniel Kroening. 2024. Towards translating real-world code with LLMs: A study of translating to Rust. arXiv preprint arXiv:2405.11514 (2024)."},{"key":"e_1_3_2_1_9_1","volume-title":"Preliminary report","author":"Gebser Martin","year":"2021","unstructured":"Martin Gebser, Roland Kaminski, Benjamin Kaufmann, and Torsten Schaub. 2021. Clingo= ASP+ control. Preliminary report (2021)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72200-7_23"},{"key":"e_1_3_2_1_11_1","volume-title":"Molly Q Feldman, Sumit Gulwani, and Gabrielle Allen.","author":"Guha Arjun","year":"2025","unstructured":"Arjun Guha, Ben Zorn, Carolyn Jane Anderson, Molly Q Feldman, Sumit Gulwani, and Gabrielle Allen. 2025. The Future of Programming in the Age of Large Language Models. Future (2025)."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 41st International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"20642","author":"Huh Minyoung","year":"2024","unstructured":"Minyoung Huh, Brian Cheung, Tongzhou Wang, and Phillip Isola. 2024. Position: The Platonic Representation Hypothesis. In Proceedings of the 41st International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 235), Ruslan Salakhutdinov, Zico Kolter, Katherine Heller, Adrian Weller, Nuria Oliver, Jonathan Scarlett, and Felix Berkenkamp (Eds.). PMLR, 20617--20642. https:\/\/proceedings.mlr.press\/v235\/huh24a.html"},{"key":"e_1_3_2_1_13_1","unstructured":"Nam Huynh and Beiyu Lin. 2025. Large Language Models for Code Generation: A Comprehensive Survey of Challenges Techniques Evaluation and Applications. arXiv:2503.01245 [cs.SE] https:\/\/arxiv.org\/abs\/2503.01245"},{"key":"e_1_3_2_1_14_1","unstructured":"Kyomin Hwang Suyoung Kim JunHoo Lee and Nojun Kwak. 2024. Do not think about pink elephant! arXiv:2404.15154 [cs.CL] https:\/\/arxiv.org\/abs\/2404.15154"},{"key":"e_1_3_2_1_15_1","unstructured":"IOCCC Organizers. 2024. The International Obfuscated C Code Contest. https:\/\/www.ioccc.org."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3747588"},{"key":"e_1_3_2_1_17_1","volume-title":"The Thirty-eighth Annual Conference on Neural Information Processing Systems. https:\/\/openreview.net\/forum?id=WJ04ZX8txM","author":"Jiang Yibo","year":"2024","unstructured":"Yibo Jiang, Goutham Rajendran, Pradeep Kumar Ravikumar, and Bryon Aragam. 2024. Do LLMs dream of elephants (when told not to)? Latent concept association and associative memory in transformers. In The Thirty-eighth Annual Conference on Neural Information Processing Systems. https:\/\/openreview.net\/forum?id=WJ04ZX8txM"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3692070.3692961"},{"key":"e_1_3_2_1_19_1","volume-title":"The Twelfth International Conference on Learning Representations.","author":"Khattab Omar","year":"2024","unstructured":"Omar Khattab, Arnav Singhvi, Paridhi Maheshwari, Zhiyuan Zhang, Keshav Santhanam, Sri Vardhamanan, Saiful Haq, Ashutosh Sharma, Thomas T. Joshi, Hanna Moazam, Heather Miller, Matei Zaharia, and Christopher Potts. 2024. DSPy: Compiling Declarative Language Model Calls into Self-Improving Pipelines. The Twelfth International Conference on Learning Representations."},{"key":"e_1_3_2_1_20_1","unstructured":"Holger Krekel and pytest-dev team. 2025. pluggy: A minimalist production-ready plugin system. https:\/\/github.com\/pytest-dev\/pluggy"},{"key":"e_1_3_2_1_21_1","unstructured":"Junwei Liu Kaixin Wang Yixuan Chen Xin Peng Zhenpeng Chen Lingming Zhang and Yiling Lou. 2024. Large Language Model-Based Agents for Software Engineering: A Survey. arXiv:2409.02977 [cs.SE] https:\/\/arxiv.org\/abs\/2409.02977"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52683-2_2"},{"key":"e_1_3_2_1_23_1","unstructured":"OpenAI. 2024. GPT-4o System Card. arXiv:2410.21276 [cs.CL] https:\/\/arxiv.org\/abs\/2410.21276"},{"key":"e_1_3_2_1_24_1","volume-title":"Rosetta Code: Programming Tasks. https:\/\/rosettacode.org","author":"Rosetta Code","year":"2024","unstructured":"Rosetta Code contributors. 2024. Rosetta Code: Programming Tasks. https:\/\/rosettacode.org"},{"key":"e_1_3_2_1_25_1","volume-title":"Survey reveals AI's impact on the developer experience. Updated","author":"Shani Inbal","year":"2024","unstructured":"Inbal Shani and GitHub Staff. 2023. Survey reveals AI's impact on the developer experience. Updated February 7, 2024."},{"key":"e_1_3_2_1_26_1","volume-title":"Llms are also effective embedding models: An in-depth overview. arXiv preprint arXiv:2412.12591","author":"Tao Chongyang","year":"2024","unstructured":"Chongyang Tao, Tao Shen, Shen Gao, Junshuo Zhang, Zhen Li, Zhengwei Tao, and Shuai Ma. 2024. Llms are also effective embedding models: An in-depth overview. arXiv preprint arXiv:2412.12591 (2024)."},{"key":"e_1_3_2_1_27_1","volume-title":"Attention is all you need. Advances in neural information processing systems 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371038"},{"key":"e_1_3_2_1_29_1","unstructured":"Fangzhou Wu Xiaogeng Liu and Chaowei Xiao. 2023. Decept-Prompt: Exploiting LLM-driven Code Generation via Adversarial Natural Language Instructions. arXiv:2312.04730 [cs.CR] https:\/\/arxiv.org\/abs\/2312.04730"},{"key":"e_1_3_2_1_30_1","unstructured":"Xilie Xu Keyi Kong Ning Liu Lizhen Cui Di Wang Jingfeng Zhang and Mohan Kankanhalli. 2023. An LLM can Fool Itself: A Prompt-Based Adversarial Attack. arXiv:2310.13345 [cs.CR] https:\/\/arxiv.org\/abs\/2310.13345"},{"key":"e_1_3_2_1_31_1","unstructured":"Rem Yang Julian Dai Nikos Vasilakis and Martin Rinard. 2025. Evaluating the Generalization Capabilities of Large Language Models on Code Reasoning. arXiv:2504.05518 [cs.SE] https:\/\/arxiv.org\/abs\/2504.05518"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267590"},{"key":"e_1_3_2_1_33_1","volume-title":"More Than a Score: Probing the Impact of Prompt Specificity on LLM Code Generation. arXiv preprint arXiv:2508.03678","author":"Zi Yangtian","year":"2025","unstructured":"Yangtian Zi, Harshitha Menon, and Arjun Guha. 2025. More Than a Score: Probing the Impact of Prompt Specificity on LLM Code Generation. arXiv preprint arXiv:2508.03678 (2025)."},{"key":"e_1_3_2_1_34_1","volume-title":"Migrating code at scale with LLMs at google. arXiv preprint arXiv:2504.09691","author":"Ziftci Celal","year":"2025","unstructured":"Celal Ziftci, Stoyan Nikolov, Anna Sj\u00f6vall, Bo Kim, Daniele Codecasa, and Max Kim. 2025. Migrating code at scale with LLMs at google. arXiv preprint arXiv:2504.09691 (2025)."}],"event":{"name":"SOSP '25: ACM SIGOPS 31st Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Seoul Republic of Korea","acronym":"SOSP '25"},"container-title":["Proceedings of the 4th Workshop on Practical Adoption Challenges of ML for Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3766882.3767171","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3766882.3767171","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3766882.3767171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T17:20:11Z","timestamp":1763054411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3766882.3767171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":34,"alternative-id":["10.1145\/3766882.3767171","10.1145\/3766882"],"URL":"https:\/\/doi.org\/10.1145\/3766882.3767171","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-10-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}