{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:43Z","timestamp":1773511123449,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3543291","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"789-792","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities"],"prefix":"10.1145","author":[{"given":"Eduard","family":"Pinconschi","sequence":"first","affiliation":[{"name":"INESC-ID, Portugal \/ University of Porto, Portugal"}]},{"given":"Quang-Cuong","family":"Bui","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Germany"}]},{"given":"Rui","family":"Abreu","sequence":"additional","affiliation":[{"name":"INESC-ID, Portugal \/ University of Porto, Portugal"}]},{"given":"Pedro","family":"Ad\u00e3o","sequence":"additional","affiliation":[{"name":"IST-ULisboa, Portugal \/ Instituto de Telecomunica\u00e7\u00f5es, Portugal"}]},{"given":"Riccardo","family":"Scandariato","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Q. C. Bui R. Scandariato and N. E. D\u00edaz Ferreyra. 2022. Vul4J: A Dataset of Reproducible Java Vulnerabilities Geared Towards the Study of Program Repair Techniques. In MSR. \t\t\t\t\t  Q. C. Bui R. Scandariato and N. E. D\u00edaz Ferreyra. 2022. Vul4J: A Dataset of Reproducible Java Vulnerabilities Geared Towards the Study of Program Repair Techniques. In MSR.","DOI":"10.1145\/3524842.3528482"},{"key":"e_1_3_2_1_2_1","unstructured":"Brian Caswell. 2017. Cyber Grand Challenge Corpus. http:\/\/www.lungetech.com\/cgc-corpus Accessed 19-April-2022 \t\t\t\t\t  Brian Caswell. 2017. Cyber Grand Challenge Corpus. http:\/\/www.lungetech.com\/cgc-corpus Accessed 19-April-2022"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Z. Chen S. Kommrusch and M. Monperrus. 2022. Neural Transfer Learning for Repairing Security Vulnerabilities in C Code. IEEE TSE. \t\t\t\t\t  Z. Chen S. Kommrusch and M. Monperrus. 2022. Neural Transfer Learning for Repairing Security Vulnerabilities in C Code. IEEE TSE.","DOI":"10.1109\/TSE.2022.3147265"},{"key":"e_1_3_2_1_4_1","unstructured":"J. Chi Y. Qu T. Liu Q. Zheng and H. Yin. 2020. SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning. arXiv:2010.10805. \t\t\t\t\t  J. Chi Y. Qu T. Liu Q. Zheng and H. Yin. 2020. SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning. arXiv:2010.10805."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"T. Durieux F. Madeiral M. Martinez and R. Abreu. 2019. Empirical Review of Java Program Repair Tools: A Large-Scale Experiment on 2 141 Bugs and 23 551 Repair Attempts. In ESEC\/FSE. \t\t\t\t\t  T. Durieux F. Madeiral M. Martinez and R. Abreu. 2019. Empirical Review of Java Program Repair Tools: A Large-Scale Experiment on 2 141 Bugs and 23 551 Repair Attempts. In ESEC\/FSE.","DOI":"10.1145\/3338906.3338911"},{"key":"e_1_3_2_1_6_1","unstructured":"NSA Center for Assured Software. 2020. Test Suites. https:\/\/samate.nist.gov\/SARD\/testsuite.php Accessed 19-April-2022 \t\t\t\t\t  NSA Center for Assured Software. 2020. Test Suites. https:\/\/samate.nist.gov\/SARD\/testsuite.php Accessed 19-April-2022"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"F. Gao L. Wang and X. Li. 2016. BovInspector: Automatic inspection and repair of buffer overflow vulnerabilities. In ASE. \t\t\t\t\t  F. Gao L. Wang and X. Li. 2016. BovInspector: Automatic inspection and repair of buffer overflow vulnerabilities. In ASE.","DOI":"10.1145\/2970276.2970282"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Q. Gao Y. Xiong Y. Mi L. Zhang W. Yang Z. Zhou B. Xie and H. Mei. 2015. Safe Memory-Leak Fixing for C Programs. In ICSE. \t\t\t\t\t  Q. Gao Y. Xiong Y. Mi L. Zhang W. Yang Z. Zhou B. Xie and H. Mei. 2015. Safe Memory-Leak Fixing for C Programs. In ICSE.","DOI":"10.1109\/ICSE.2015.64"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"X. Gao S. Mechtaev and A. Roychoudhury. 2019. Crash-Avoiding Program Repair. In ISSTA. \t\t\t\t\t  X. Gao S. Mechtaev and A. Roychoudhury. 2019. Crash-Avoiding Program Repair. In ISSTA.","DOI":"10.1145\/3293882.3330558"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3418461"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Z. Huang D. Lie G. Tan and T. Jaeger. 2019. Using Safety Properties to Generate Vulnerability Patches. In S&P. \t\t\t\t\t  Z. Huang D. Lie G. Tan and T. Jaeger. 2019. Using Safety Properties to Generate Vulnerability Patches. In S&P.","DOI":"10.1109\/SP.2019.00071"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"M. Kechagia S. Mechtaev F. Sarro and M. Harman. 2021. Evaluating automatic program repair capabilities to repair API misuses. IEEE TSE. \t\t\t\t\t  M. Kechagia S. Mechtaev F. Sarro and M. Harman. 2021. Evaluating automatic program repair capabilities to repair API misuses. IEEE TSE.","DOI":"10.1109\/TSE.2021.3067156"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"J. Lee S. Hong and H. Oh. 2018. MemFix: Static Analysis-Based Repair of Memory Deallocation Errors for C. In ESEC\/FSE. \t\t\t\t\t  J. Lee S. Hong and H. Oh. 2018. MemFix: Static Analysis-Based Repair of Memory Deallocation Errors for C. In ESEC\/FSE.","DOI":"10.1145\/3236024.3236079"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Z. Lin X. Jiang D. Xu B. Mao and L. Xie. 2007. AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair. In ASIACCS. \t\t\t\t\t  Z. Lin X. Jiang D. Xu B. Mao and L. Xie. 2007. AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair. In ASIACCS.","DOI":"10.1145\/1229285.1267001"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"F. Long S. Sidiroglou D. Kim and M. Rinard. 2014. Sound Input Filter Generation for Integer Overflow Errors. In POPL. \t\t\t\t\t  F. Long S. Sidiroglou D. Kim and M. Rinard. 2014. Sound Input Filter Generation for Integer Overflow Errors. In POPL.","DOI":"10.1145\/2535838.2535888"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_13"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"P. Muntean M. Monperrus H. Sun J. Grossklags and C. Eckert. 2021. IntRepair: Informed Repairing of Integer Overflows. IEEE TSE. \t\t\t\t\t  P. Muntean M. Monperrus H. Sun J. Grossklags and C. Eckert. 2021. IntRepair: Informed Repairing of Integer Overflows. IEEE TSE.","DOI":"10.1109\/TSE.2019.2946148"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"E. Pinconschi R. Abreu and P. Ad\u00e3o. 2021. A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities. In ISSRE. \t\t\t\t\t  E. Pinconschi R. Abreu and P. Ad\u00e3o. 2021. A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities. In ISSRE.","DOI":"10.1109\/ISSRE52982.2021.00031"},{"key":"e_1_3_2_1_19_1","volume-title":"Poster: BugZoo \u2013 A Platform for Studying Software Bugs. In ICSE-C.","author":"Timperley C. S.","year":"2018","unstructured":"C. S. Timperley , S. Stepney , and C. L. Goues . 2018 . Poster: BugZoo \u2013 A Platform for Studying Software Bugs. In ICSE-C. C. S. Timperley, S. Stepney, and C. L. Goues. 2018. Poster: BugZoo \u2013 A Platform for Studying Software Bugs. In ICSE-C."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"T. Wang C. Song and W. Lee. 2014. Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. In DIMVA. \t\t\t\t\t  T. Wang C. Song and W. Lee. 2014. Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. In DIMVA.","DOI":"10.1007\/978-3-319-08509-8_14"},{"key":"e_1_3_2_1_21_1","volume-title":"D. Yao, and N. Meng.","author":"Zhang Y.","year":"2022","unstructured":"Y. Zhang , Y. Xiao , M M A Kabir , D. Yao, and N. Meng. 2022 . Example-Based Vulnerability Detection and Repair in Java Code . arXiv:2203.09009. Y. Zhang, Y. Xiao, M M A Kabir, D. Yao, and N. Meng. 2022. Example-Based Vulnerability Detection and Repair in Java Code. arXiv:2203.09009."}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3543291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3543291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:41Z","timestamp":1750272221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3543291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":21,"alternative-id":["10.1145\/3533767.3543291","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3543291","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}