{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:44:28Z","timestamp":1777016668221,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,17]]},"DOI":"10.1145\/3799830.3799836","type":"proceedings-article","created":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T06:45:08Z","timestamp":1777013108000},"page":"52-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ccPASTpqc: Post Quantum Cryptography Migration of Programs Using Code Language Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0936-7664","authenticated-orcid":false,"given":"Roisan","family":"Wahlang","sequence":"first","affiliation":[{"name":"TCS Research, Gandhinagar, Gujarat, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2412-6391","authenticated-orcid":false,"given":"Kumar","family":"Vidhani","sequence":"additional","affiliation":[{"name":"TCS Research, Gandhinagar, Gujarat, India"}]}],"member":"320","published-online":{"date-parts":[[2026,4,23]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Python\u00a0Cryptographic Authority. 2013. Cryptography Library. https:\/\/cryptography.io\/en. Accessed: 2024."},{"key":"e_1_3_3_2_3_2","unstructured":"Python\u00a0Cryptographic Authority. 2013. PyNaCl Library. https:\/\/pynacl.readthedocs.io\/en. Accessed: 2024."},{"key":"e_1_3_3_2_4_2","unstructured":"Python\u00a0Cryptographic Authority. 2016. PyOpenSSL Library. https:\/\/www.pyopenssl.org\/en\/stable\/index.html. Accessed: 2024."},{"key":"e_1_3_3_2_5_2","unstructured":"Berkay Berabi Alexey Gronskiy Veselin Raychev Gishor Sivanrupan Victor Chibotaru and Martin Vechev. 2024. DeepCode AI Fix: Fixing Security Vulnerabilities with Large Language Models. arXiv:https:\/\/arXiv.org\/abs\/2402.13291\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2402.13291"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25510-7_12"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56880-1_3"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Quang-Cuong Bui Ranindya Paramitha Duc-Ly Vu Fabio Massacci and Riccardo Scandariato. 2024. APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities. Empirical software engineering 29 1 (2024) 18.","DOI":"10.1007\/s10664-023-10415-7"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSES62373.2024.10561274"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Zimin Chen Steve Kommrusch and Martin Monperrus. 2022. Neural transfer learning for repairing security vulnerabilities in c code. IEEE Transactions on Software Engineering 49 1 (2022) 147\u2013165.","DOI":"10.1109\/TSE.2022.3147265"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Jianlei Chi Yu Qu Ting Liu Qinghua Zheng and Heng Yin. 2022. Seqtrans: automatic vulnerability fix via sequence to sequence learning. IEEE Transactions on Software Engineering 49 2 (2022) 564\u2013585.","DOI":"10.1109\/TSE.2022.3156637"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Tri Dao Dan Fu Stefano Ermon Atri Rudra and Christopher R\u00e9. 2022. Flashattention: Fast and memory-efficient exact attention with io-awareness. Advances in neural information processing systems 35 (2022) 16344\u201316359.","DOI":"10.52202\/068431-1189"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.66"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1423"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"L\u00e9o Ducas Eike Kiltz Tancr\u00e8de Lepoint Vadim Lyubashevsky Peter Schwabe Gregor Seiler and Damien Stehl\u00e9. 2018. CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. IACR Transactions on Cryptographic Hardware and Embedded Systems 2018 1 (2018) 238\u2013268. 10.13154\/tches.v2018.i1.238-268","DOI":"10.13154\/tches.v2018.i1.238-268"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/2896921.2896931"},{"key":"e_1_3_3_2_18_2","unstructured":"Helder Eijs. 2014. PyCryptoDome Library. https:\/\/www.pycryptodome.org. Accessed: 2024."},{"key":"e_1_3_3_2_19_2","unstructured":"Linyuan Gong Mostafa Elhoushi and Alvin Cheung. 2024. AST-T5: Structure-Aware Pretraining for Code Generation and Understanding. arXiv:https:\/\/arXiv.org\/abs\/2401.03003\u00a0[cs.SE] https:\/\/arxiv.org\/abs\/2401.03003"},{"key":"e_1_3_3_2_20_2","unstructured":"Hartmut\u00a0Neven Google. 2024. Meet Willow our state-of-the-art quantum chip. https:\/\/blog.google\/technology\/research\/google-willow-quantum-chip\/. Accessed: 2025."},{"key":"e_1_3_3_2_21_2","unstructured":"NIS\u00a0Cooperation Group. 2025. A Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography. https:\/\/digital-strategy.ec.europa.eu\/en\/library\/coordinated-implementation-roadmap-transition-post-quantum-cryptography. Accessed: 2025."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Khondokar\u00a0Fida Hasan Leonie Simpson Mir Ali\u00a0Rezazadeh Baee Chadni Islam Ziaur Rahman Warren Armstrong Praveen Gauravaram and Matthew McKague. 2024. A framework for migrating to post-quantum cryptography: Security dependency analysis and case studies. IEEE Access 12 (2024) 23427\u201323450.","DOI":"10.1109\/ACCESS.2024.3360412"},{"key":"e_1_3_3_2_24_2","unstructured":"IBM. 2025. IBM Sets the Course to Build World\u2019s First Large-Scale Fault-Tolerant Quantum Computer. https:\/\/newsroom.ibm.com\/2025-06-10-IBM-Sets-the-Course-to-Build-Worlds-First-Large-Scale -Fault-Tolerant-Quantum-Computer-at-New-IBM-Quantum-Data-Center. Accessed: 2025."},{"key":"e_1_3_3_2_25_2","unstructured":"Jay\u00a0Gambetta IBM. 2022. Expanding the IBM Quantum roadmap to anticipate the future of quantum-centric supercomputing. https:\/\/www.ibm.com\/quantum\/blog\/ibm-quantum-roadmap-2025. Accessed: 2025."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Anil Koyuncu Kui Liu Tegawend\u00e9\u00a0F Bissyand\u00e9 Dongsun Kim Jacques Klein Martin Monperrus and Yves Le\u00a0Traon. 2020. Fixminer: Mining relevant fix patterns for automated program repair. Empirical Software Engineering 25 (2020) 1980\u20132024.","DOI":"10.1007\/s10664-019-09780-z"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Claire Le\u00a0Goues ThanhVu Nguyen Stephanie Forrest and Westley Weimer. 2011. Genprog: A generic method for automatic software repair. Ieee transactions on software engineering 38 1 (2011) 54\u201372.","DOI":"10.1109\/TSE.2011.104"},{"key":"e_1_3_3_2_28_2","first-page":"35735","volume-title":"Proceedings of the Thirteenth International Conference on Learning Representations (ICLR)","author":"Li Ziyang","year":"2025","unstructured":"Ziyang Li, Saikat Dutta, and Mayur Naik. 2025. IRIS: LLM-Assisted Static Analysis for Detecting Security Vulnerabilities. In Proceedings of the Thirteenth International Conference on Learning Representations (ICLR). International Conference on Learning Representations, Singapore, 35735\u201335758. https:\/\/proceedings.iclr.cc\/paper_files\/paper\/2025\/file\/582d4e27fa24168f3af1f4582655034b-Paper-Conference.pdf"},{"key":"e_1_3_3_2_29_2","unstructured":"Jerry Liu. 2023. LlamaIndex - CodeSplitter. https:\/\/docs.llamaindex.ai\/en\/v0.10.19\/api\/llama_index.core.node_parser.CodeSplitter.html. Accessed: 2025."},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330577"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2948705"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR52588.2021.00063"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"e_1_3_3_2_34_2","unstructured":"Chetan\u00a0Nayak Microsoft. 2025. Microsoft Unveils Majorana-1. https:\/\/azure.microsoft.com\/en-us\/blog\/quantum\/2025\/02\/19\/microsoft-unveils-majorana-1-the-worlds-first-quantum-processor-powered-by-topological-qubits. Accessed: 2025."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Michele Mosca. 2018. Cybersecurity in an era with quantum computers: Will we be ready? IEEE Security & Privacy 16 5 (2018) 38\u201341.","DOI":"10.1109\/MSP.2018.3761723"},{"key":"e_1_3_3_2_36_2","unstructured":"Michele Mosca and Marco Piani. 2021. Quantum Threat Timeline Report 2020. https:\/\/globalriskinstitute.org\/publication\/quantum-threat-timeline\/. Accessed: 2024."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"Christian N\u00e4ther Daniel Herzinger Stefan-Lukas Gazdag Jan-Philipp Stegh\u00f6fer Simon Daum and Daniel Loebenberger. 2024. Migrating Software Systems Towards Post-Quantum Cryptography \u2013 A Systematic Literature Review. IEEE Access 12 (2024) 132107\u2013132126. 10.1109\/ACCESS.2024.3450306","DOI":"10.1109\/ACCESS.2024.3450306"},{"key":"e_1_3_3_2_38_2","unstructured":"National\u00a0Institute of Standards and Technology. 2001. Advanced Encryption Standard. https:\/\/csrc.nist.gov\/pubs\/fips\/197\/final. Accessed: 2024."},{"key":"e_1_3_3_2_39_2","unstructured":"National\u00a0Institute of Standards and Technology. 2017. Post-Quantum Cryptography Standardization. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization. Accessed: 2024."},{"key":"e_1_3_3_2_40_2","volume-title":"Module-Lattice-Based Digital Signature Standard","author":"Standards National\u00a0Institute of","year":"2024","unstructured":"National\u00a0Institute of Standards and Technology. 2024. Module-Lattice-Based Digital Signature Standard. Standard FIPS-204. NIST, Gaithersburg, MD."},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.FIPS.203","volume-title":"Module-Lattice-Based Key-Encapsulation Mechanism Standard","author":"Standards National\u00a0Institute of","year":"2024","unstructured":"National\u00a0Institute of Standards and Technology. 2024. Module-Lattice-Based Key-Encapsulation Mechanism Standard. Standard FIPS-203. NIST, Gaithersburg, MD."},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00026"},{"key":"e_1_3_3_2_43_2","unstructured":"Open\u00a0Quantum Safe. 2018. liboqs - Open source C library for quantum-safe cryptographic algorithms. https:\/\/github.com\/open-quantum-safe\/liboqs. Accessed: 2025."},{"key":"e_1_3_3_2_44_2","unstructured":"Open\u00a0Quantum Safe. 2022. oqsprovider - Open Quantum Safe provider for OpenSSL (3.x). https:\/\/github.com\/open-quantum-safe\/oqs-provider. Accessed: 2025."},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/iCAST57874.2023.10359288"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"crossref","unstructured":"Peter\u00a0W Shor. 1999. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM review 41 2 (1999) 303\u2013332.","DOI":"10.1137\/S0036144598347011"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR59073.2023.00027"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3655693.3655719"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"crossref","unstructured":"Yue Wang Weishi Wang Shafiq Joty and Steven C.\u00a0H. Hoi. 2021. CodeT5: Identifier-Aware Unified Pre-Trained Encoder-Decoder Models for Code Understanding and Generation. arXiv:https:\/\/arXiv.org\/abs\/2109.00859\u00a0[cs.CL] https:\/\/arxiv.org\/abs\/2109.00859","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598135"},{"key":"e_1_3_3_2_51_2","series-title":"Proceedings of Machine Learning Research","first-page":"11941","volume-title":"Proceedings of the 38th International Conference on Machine Learning","volume":"139","author":"Yasunaga Michihiro","year":"2021","unstructured":"Michihiro Yasunaga and Percy Liang. 2021. Break-It-Fix-It: Unsupervised Learning for Program Repair. In Proceedings of the 38th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a0139). Proceedings of Machine Learning Research, Virtual Event, 11941\u201311952. https:\/\/proceedings.mlr.press\/v139\/yasunaga21a.html"},{"key":"e_1_3_3_2_52_2","unstructured":"Yuntong Zhang Jiawei Wang Dominic Berzin Martin Mirchev Dongge Liu Abhishek Arya Oliver Chang and Abhik Roychoudhury. 2024. Fixing Security Vulnerabilities with AI in OSS-Fuzz. arXiv:https:\/\/arXiv.org\/abs\/2411.03346\u00a0[cs.SE] https:\/\/arxiv.org\/abs\/2411.03346"}],"event":{"name":"CODS 2025: 13th ACM IKDD International Conference on Data Science","location":"Pune India","acronym":"CODS 2025"},"container-title":["Proceedings of the 13th ACM IKDD International Conference on Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3799830.3799836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:12:18Z","timestamp":1777014738000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3799830.3799836"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,17]]},"references-count":51,"alternative-id":["10.1145\/3799830.3799836","10.1145\/3799830"],"URL":"https:\/\/doi.org\/10.1145\/3799830.3799836","relation":{},"subject":[],"published":{"date-parts":[[2025,12,17]]},"assertion":[{"value":"2026-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}