{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:46:19Z","timestamp":1773085579934,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3559534","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["A transformer-based IDE plugin for vulnerability detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3283-4360","authenticated-orcid":false,"given":"Cl\u00e1udia","family":"Mamede","sequence":"first","affiliation":[{"name":"FEUP, U. Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0729-4684","authenticated-orcid":false,"given":"Eduard","family":"Pinconschi","sequence":"additional","affiliation":[{"name":"FEUP, U. Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3734-3157","authenticated-orcid":false,"given":"Rui","family":"Abreu","sequence":"additional","affiliation":[{"name":"INESC-ID &amp; FEUP, U. Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Alexopoulos Nikolaos","year":"2022","unstructured":"Nikolaos Alexopoulos, Manuel Brack, Jan\u00a0Philipp Wagner, Tim Grube, and Max M\u00fchlh\u00e4user. 2022. How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_2_3_1","volume-title":"Deep Learning based Vulnerability Detection: Are We There Yet? (9","author":"Chakraborty Saikat","year":"2020","unstructured":"Saikat Chakraborty, Rahul Krishna, Yangruibo Ding, and Baishakhi Ray. 2020. Deep Learning based Vulnerability Detection: Are We There Yet? (9 2020)."},{"key":"e_1_3_2_2_4_1","unstructured":"Roland Croft Yongzhen Xie and Muhammad\u00a0Ali Babar. 2021. Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review. ArXiv abs\/2109.05740(2021)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Nelson\u00a0Tavares de Sousa and Wilhelm Hasselbring. 2021. JavaBERT: Training a transformer-based model for the Java programming language. CoRR abs\/2110.10404(2021). arXiv:2110.10404","DOI":"10.1109\/ASEW52652.2021.00028"},{"key":"e_1_3_2_2_6_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR abs\/1810.04805(2018). arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR abs\/1810.04805(2018). arXiv:1810.04805"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.06.063"},{"key":"e_1_3_2_2_8_1","unstructured":"Afshin Gholamy Vladik Kreinovich and Olga Kosheleva. 2018. Why 70\/30 or 80\/20 Relation Between Training and Testing Sets: A Pedagogical Explanation."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"e_1_3_2_2_10_1","volume-title":"Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning. Applied Sciences 10, 5","author":"Li Xin","year":"2020","unstructured":"Xin Li, Lu Wang, Yang Xin, Yixian Yang, and Yuling Chen. 2020. Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning. Applied Sciences 10, 5 (2020)."},{"key":"e_1_3_2_2_11_1","volume-title":"Automated Software Vulnerability Detection Based on Hybrid Neural Network. Applied Sciences 11 (4","author":"Li Xin","year":"2021","unstructured":"Xin Li, Lu Wang, Yang Xin, Yixian Yang, Qifeng Tang, and Yuling Chen. 2021. Automated Software Vulnerability Detection Based on Hybrid Neural Network. Applied Sciences 11 (4 2021), 3201. Issue 7."},{"key":"e_1_3_2_2_12_1","volume-title":"SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities","author":"Li Zhen","year":"2021","unstructured":"Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, and Zhaoxuan Chen. 2021. SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE Transactions on Dependable and Secure Computing (2021), 1\u20131."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"e_1_3_2_2_14_1","volume-title":"Vulnerability Detection in Open Source Software: The Cure and the Cause","author":"Millar Stuart","unstructured":"Stuart Millar. 2017. Vulnerability Detection in Open Source Software: The Cure and the Cause. Queen\u2019s University Belfast."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2810116"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10029-x"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173836"},{"key":"e_1_3_2_2_18_1","volume-title":"(6","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention Is All You Need. (6 2017)."},{"key":"e_1_3_2_2_19_1","unstructured":"Benjamin White. 2016. Secure Coding Assistant: enforcing secure coding practices using the Eclipse Development Environment."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677280"},{"key":"e_1_3_2_2_21_1","unstructured":"Lauren Williams. 2018. Secure Software Lifecycle Knowledge Area. (2018)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Thomas Wolf Lysandre Debut Victor Sanh Julien Chaumond Clement Delangue Anthony Moi Pierric Cistac Tim Rault R\u00e9mi Louf Morgan Funtowicz and Jamie Brew. 2019. HuggingFace\u2019s Transformers: State-of-the-art Natural Language Processing. ArXiv abs\/1910.03771(2019).","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076770"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484500"},{"key":"e_1_3_2_2_25_1","volume-title":"\u03bc VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection","author":"Zou Deqing","year":"2019","unstructured":"Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, and Hai Jin. 2019. \u03bc VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. IEEE Transactions on Dependable and Secure Computing (2019), 1\u20131."}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","location":"Rochester MI USA","acronym":"ASE '22"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3559534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3559534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T08:29:54Z","timestamp":1755851394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3559534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":25,"alternative-id":["10.1145\/3551349.3559534","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3559534","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}