Mystique: Automated Vulnerability Patch Porting with Semantic and Syntactic-Enhanced LLM Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1145/3715718
Branching repositories facilitates efficient software development but can also inadvertently propagate vulnerabilities. When an original branch is patched, other unfixed branches remain vulnerable unless the patch is successfully ported. However, due to inherent discrepancies between branches, many patches cannot be directly applied and require manual intervention, which is time-consuming and leads to delays in patch porting, increasing vulnerability risks. Existing automated patch porting approaches are prone to errors, as they often overlook essential semantic and syntactic context of vulnerability and fail to detect or refine faulty patches. We propose Mystique, a novel LLM-based approach to address these limitations. Mystique first slices the semantic-related statements linked to the vulnerability while ensuring syntactic correctness, allowing it to extract the signatures for both the original patched function and the target vulnerable function. Mystique then utilizes a fine-tuned LLM to generate a fixed function, which is further iteratively checked and refined to ensure successful porting. Our evaluation shows that Mystique achieved a success rate of 0.954 at function level and of 0.924 at CVE level, outperforming state-of-the-art approaches by at least 13.2% at function level and 12.3% at CVE level. Our evaluation also demonstrates Mystique’s superior generality across various projects, bugs, and programming languages. Mystique successfully ported patches for 34 real-world vulnerable branches.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1145/3715718
- OA Status
- hybrid
- References
- 33
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4411450077
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4411450077Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1145/3715718Digital Object Identifier
- Title
-
Mystique: Automated Vulnerability Patch Porting with Semantic and Syntactic-Enhanced LLMWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-06-19Full publication date if available
- Authors
-
Susheng Wu, Ruisi Wang, Yuhua Cao, Bihuan Chen, Zhuotong Zhou, Yiheng Huang, J. Zhao, Xin PengList of authors in order
- Landing page
-
https://doi.org/10.1145/3715718Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1145/3715718Direct OA link when available
- Concepts
-
Porting, Computer science, Correctness, Vulnerability (computing), Function (biology), Context (archaeology), Artificial intelligence, Programming language, Software, Computer security, Evolutionary biology, Paleontology, BiologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
33Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4411450077 |
|---|---|
| doi | https://doi.org/10.1145/3715718 |
| ids.doi | https://doi.org/10.1145/3715718 |
| ids.openalex | https://openalex.org/W4411450077 |
| fwci | 0.0 |
| type | article |
| title | Mystique: Automated Vulnerability Patch Porting with Semantic and Syntactic-Enhanced LLM |
| biblio.issue | FSE |
| biblio.volume | 2 |
| biblio.last_page | 152 |
| biblio.first_page | 130 |
| topics[0].id | https://openalex.org/T10260 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998000264167786 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Software Engineering Research |
| topics[1].id | https://openalex.org/T12423 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9994000196456909 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1712 |
| topics[1].subfield.display_name | Software |
| topics[1].display_name | Software Reliability and Analysis Research |
| topics[2].id | https://openalex.org/T10743 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9991999864578247 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1712 |
| topics[2].subfield.display_name | Software |
| topics[2].display_name | Software Testing and Debugging Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C106251023 |
| concepts[0].level | 3 |
| concepts[0].score | 0.7746058702468872 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q851989 |
| concepts[0].display_name | Porting |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.758195698261261 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C55439883 |
| concepts[2].level | 2 |
| concepts[2].score | 0.755113422870636 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q360812 |
| concepts[2].display_name | Correctness |
| concepts[3].id | https://openalex.org/C95713431 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5188513994216919 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q631425 |
| concepts[3].display_name | Vulnerability (computing) |
| concepts[4].id | https://openalex.org/C14036430 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5028607249259949 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3736076 |
| concepts[4].display_name | Function (biology) |
| concepts[5].id | https://openalex.org/C2779343474 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4498615562915802 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3109175 |
| concepts[5].display_name | Context (archaeology) |
| concepts[6].id | https://openalex.org/C154945302 |
| concepts[6].level | 1 |
| concepts[6].score | 0.40663161873817444 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[6].display_name | Artificial intelligence |
| concepts[7].id | https://openalex.org/C199360897 |
| concepts[7].level | 1 |
| concepts[7].score | 0.39600133895874023 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[7].display_name | Programming language |
| concepts[8].id | https://openalex.org/C2777904410 |
| concepts[8].level | 2 |
| concepts[8].score | 0.33389487862586975 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[8].display_name | Software |
| concepts[9].id | https://openalex.org/C38652104 |
| concepts[9].level | 1 |
| concepts[9].score | 0.231251060962677 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[9].display_name | Computer security |
| concepts[10].id | https://openalex.org/C78458016 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q840400 |
| concepts[10].display_name | Evolutionary biology |
| concepts[11].id | https://openalex.org/C151730666 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q7205 |
| concepts[11].display_name | Paleontology |
| concepts[12].id | https://openalex.org/C86803240 |
| concepts[12].level | 0 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[12].display_name | Biology |
| keywords[0].id | https://openalex.org/keywords/porting |
| keywords[0].score | 0.7746058702468872 |
| keywords[0].display_name | Porting |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.758195698261261 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/correctness |
| keywords[2].score | 0.755113422870636 |
| keywords[2].display_name | Correctness |
| keywords[3].id | https://openalex.org/keywords/vulnerability |
| keywords[3].score | 0.5188513994216919 |
| keywords[3].display_name | Vulnerability (computing) |
| keywords[4].id | https://openalex.org/keywords/function |
| keywords[4].score | 0.5028607249259949 |
| keywords[4].display_name | Function (biology) |
| keywords[5].id | https://openalex.org/keywords/context |
| keywords[5].score | 0.4498615562915802 |
| keywords[5].display_name | Context (archaeology) |
| keywords[6].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[6].score | 0.40663161873817444 |
| keywords[6].display_name | Artificial intelligence |
| keywords[7].id | https://openalex.org/keywords/programming-language |
| keywords[7].score | 0.39600133895874023 |
| keywords[7].display_name | Programming language |
| keywords[8].id | https://openalex.org/keywords/software |
| keywords[8].score | 0.33389487862586975 |
| keywords[8].display_name | Software |
| keywords[9].id | https://openalex.org/keywords/computer-security |
| keywords[9].score | 0.231251060962677 |
| keywords[9].display_name | Computer security |
| language | en |
| locations[0].id | doi:10.1145/3715718 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4404663975 |
| locations[0].source.issn | 2994-970X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2994-970X |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Proceedings of the ACM on software engineering. |
| locations[0].source.host_organization | https://openalex.org/P4310319798 |
| locations[0].source.host_organization_name | Association for Computing Machinery |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319798 |
| locations[0].source.host_organization_lineage_names | Association for Computing Machinery |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings of the ACM on Software Engineering |
| locations[0].landing_page_url | https://doi.org/10.1145/3715718 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5073610803 |
| authorships[0].author.orcid | https://orcid.org/0009-0005-2169-7032 |
| authorships[0].author.display_name | Susheng Wu |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[0].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[0].institutions[0].id | https://openalex.org/I24943067 |
| authorships[0].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Fudan University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Susheng Wu |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[1].author.id | https://openalex.org/A5034212098 |
| authorships[1].author.orcid | https://orcid.org/0009-0001-6794-0721 |
| authorships[1].author.display_name | Ruisi Wang |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[1].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[1].institutions[0].id | https://openalex.org/I24943067 |
| authorships[1].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Fudan University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Ruisi Wang |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[2].author.id | https://openalex.org/A5101821319 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Yuhua Cao |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[2].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[2].institutions[0].id | https://openalex.org/I24943067 |
| authorships[2].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Fudan University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Yiheng Cao |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[3].author.id | https://openalex.org/A5059253116 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-7238-7492 |
| authorships[3].author.display_name | Bihuan Chen |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[3].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[3].institutions[0].id | https://openalex.org/I24943067 |
| authorships[3].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Fudan University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Bihuan Chen |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[4].author.id | https://openalex.org/A5109404532 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Zhuotong Zhou |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[4].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[4].institutions[0].id | https://openalex.org/I24943067 |
| authorships[4].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Fudan University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Zhuotong Zhou |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[5].author.id | https://openalex.org/A5073898228 |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | Yiheng Huang |
| authorships[5].countries | CN |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[5].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[5].institutions[0].id | https://openalex.org/I24943067 |
| authorships[5].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[5].institutions[0].country_code | CN |
| authorships[5].institutions[0].display_name | Fudan University |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Yiheng Huang |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[6].author.id | https://openalex.org/A5106323598 |
| authorships[6].author.orcid | |
| authorships[6].author.display_name | J. Zhao |
| authorships[6].countries | CN |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[6].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[6].institutions[0].id | https://openalex.org/I24943067 |
| authorships[6].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[6].institutions[0].country_code | CN |
| authorships[6].institutions[0].display_name | Fudan University |
| authorships[6].author_position | middle |
| authorships[6].raw_author_name | JunPeng Zhao |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[7].author.id | https://openalex.org/A5101854992 |
| authorships[7].author.orcid | https://orcid.org/0000-0003-3376-2581 |
| authorships[7].author.display_name | Xin Peng |
| authorships[7].countries | CN |
| authorships[7].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[7].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[7].institutions[0].id | https://openalex.org/I24943067 |
| authorships[7].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[7].institutions[0].type | education |
| authorships[7].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[7].institutions[0].country_code | CN |
| authorships[7].institutions[0].display_name | Fudan University |
| authorships[7].author_position | last |
| authorships[7].raw_author_name | Xin Peng |
| authorships[7].is_corresponding | False |
| authorships[7].raw_affiliation_strings | Fudan University, Shanghai, China |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1145/3715718 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Mystique: Automated Vulnerability Patch Porting with Semantic and Syntactic-Enhanced LLM |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10260 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998000264167786 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Software Engineering Research |
| related_works | https://openalex.org/W2356602486, https://openalex.org/W2351992668, https://openalex.org/W2324828474, https://openalex.org/W2374315191, https://openalex.org/W2391207559, https://openalex.org/W2384715785, https://openalex.org/W2349624418, https://openalex.org/W2064459023, https://openalex.org/W2384611437, https://openalex.org/W2347873412 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1145/3715718 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4404663975 |
| best_oa_location.source.issn | 2994-970X |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2994-970X |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Proceedings of the ACM on software engineering. |
| best_oa_location.source.host_organization | https://openalex.org/P4310319798 |
| best_oa_location.source.host_organization_name | Association for Computing Machinery |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319798 |
| best_oa_location.source.host_organization_lineage_names | Association for Computing Machinery |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings of the ACM on Software Engineering |
| best_oa_location.landing_page_url | https://doi.org/10.1145/3715718 |
| primary_location.id | doi:10.1145/3715718 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4404663975 |
| primary_location.source.issn | 2994-970X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2994-970X |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Proceedings of the ACM on software engineering. |
| primary_location.source.host_organization | https://openalex.org/P4310319798 |
| primary_location.source.host_organization_name | Association for Computing Machinery |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319798 |
| primary_location.source.host_organization_lineage_names | Association for Computing Machinery |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings of the ACM on Software Engineering |
| primary_location.landing_page_url | https://doi.org/10.1145/3715718 |
| publication_date | 2025-06-19 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W2972704946, https://openalex.org/W3156480510, https://openalex.org/W3201454943, https://openalex.org/W3116924855, https://openalex.org/W6893179439, https://openalex.org/W2344973853, https://openalex.org/W2777654931, https://openalex.org/W3012626099, https://openalex.org/W4388867283, https://openalex.org/W4285417467, https://openalex.org/W1531677189, https://openalex.org/W1543330234, https://openalex.org/W4214512383, https://openalex.org/W2912541793, https://openalex.org/W40327287, https://openalex.org/W4308643994, https://openalex.org/W4285827657, https://openalex.org/W2913096780, https://openalex.org/W4224307896, https://openalex.org/W4251214056, https://openalex.org/W4285490400, https://openalex.org/W4240061226, https://openalex.org/W4391558518, https://openalex.org/W2911282308, https://openalex.org/W4398239361, https://openalex.org/W4250967164, https://openalex.org/W4247072206, https://openalex.org/W2911918032, https://openalex.org/W2914982603, https://openalex.org/W2963909831, https://openalex.org/W2911623293, https://openalex.org/W4234110858, https://openalex.org/W4389162688 |
| referenced_works_count | 33 |
| abstract_inverted_index.a | 90, 132, 137, 157 |
| abstract_inverted_index.34 | 205 |
| abstract_inverted_index.We | 87 |
| abstract_inverted_index.an | 13 |
| abstract_inverted_index.as | 68 |
| abstract_inverted_index.at | 162, 168, 175, 178, 183 |
| abstract_inverted_index.be | 39 |
| abstract_inverted_index.by | 174 |
| abstract_inverted_index.in | 53 |
| abstract_inverted_index.is | 16, 26, 47, 141 |
| abstract_inverted_index.it | 113 |
| abstract_inverted_index.of | 77, 160, 166 |
| abstract_inverted_index.or | 83 |
| abstract_inverted_index.to | 31, 51, 66, 81, 94, 105, 114, 135, 147 |
| abstract_inverted_index.CVE | 169, 184 |
| abstract_inverted_index.LLM | 134 |
| abstract_inverted_index.Our | 151, 186 |
| abstract_inverted_index.and | 42, 49, 74, 79, 124, 145, 165, 181, 197 |
| abstract_inverted_index.are | 64 |
| abstract_inverted_index.but | 6 |
| abstract_inverted_index.can | 7 |
| abstract_inverted_index.due | 30 |
| abstract_inverted_index.for | 118, 204 |
| abstract_inverted_index.the | 24, 101, 106, 116, 120, 125 |
| abstract_inverted_index.When | 12 |
| abstract_inverted_index.also | 8, 188 |
| abstract_inverted_index.both | 119 |
| abstract_inverted_index.fail | 80 |
| abstract_inverted_index.many | 36 |
| abstract_inverted_index.rate | 159 |
| abstract_inverted_index.that | 154 |
| abstract_inverted_index.then | 130 |
| abstract_inverted_index.they | 69 |
| abstract_inverted_index.0.924 | 167 |
| abstract_inverted_index.0.954 | 161 |
| abstract_inverted_index.12.3% | 182 |
| abstract_inverted_index.13.2% | 177 |
| abstract_inverted_index.bugs, | 196 |
| abstract_inverted_index.first | 99 |
| abstract_inverted_index.fixed | 138 |
| abstract_inverted_index.leads | 50 |
| abstract_inverted_index.least | 176 |
| abstract_inverted_index.level | 164, 180 |
| abstract_inverted_index.novel | 91 |
| abstract_inverted_index.often | 70 |
| abstract_inverted_index.other | 18 |
| abstract_inverted_index.patch | 25, 54, 61 |
| abstract_inverted_index.prone | 65 |
| abstract_inverted_index.shows | 153 |
| abstract_inverted_index.these | 96 |
| abstract_inverted_index.which | 46, 140 |
| abstract_inverted_index.while | 108 |
| abstract_inverted_index.across | 193 |
| abstract_inverted_index.branch | 15 |
| abstract_inverted_index.cannot | 38 |
| abstract_inverted_index.delays | 52 |
| abstract_inverted_index.detect | 82 |
| abstract_inverted_index.ensure | 148 |
| abstract_inverted_index.faulty | 85 |
| abstract_inverted_index.level, | 170 |
| abstract_inverted_index.level. | 185 |
| abstract_inverted_index.linked | 104 |
| abstract_inverted_index.manual | 44 |
| abstract_inverted_index.ported | 202 |
| abstract_inverted_index.refine | 84 |
| abstract_inverted_index.remain | 21 |
| abstract_inverted_index.risks. | 58 |
| abstract_inverted_index.slices | 100 |
| abstract_inverted_index.target | 126 |
| abstract_inverted_index.unless | 23 |
| abstract_inverted_index.address | 95 |
| abstract_inverted_index.applied | 41 |
| abstract_inverted_index.between | 34 |
| abstract_inverted_index.checked | 144 |
| abstract_inverted_index.context | 76 |
| abstract_inverted_index.errors, | 67 |
| abstract_inverted_index.extract | 115 |
| abstract_inverted_index.further | 142 |
| abstract_inverted_index.patched | 122 |
| abstract_inverted_index.patches | 37, 203 |
| abstract_inverted_index.ported. | 28 |
| abstract_inverted_index.porting | 62 |
| abstract_inverted_index.propose | 88 |
| abstract_inverted_index.refined | 146 |
| abstract_inverted_index.require | 43 |
| abstract_inverted_index.success | 158 |
| abstract_inverted_index.unfixed | 19 |
| abstract_inverted_index.various | 194 |
| abstract_inverted_index.Existing | 59 |
| abstract_inverted_index.However, | 29 |
| abstract_inverted_index.Mystique | 98, 129, 155, 200 |
| abstract_inverted_index.achieved | 156 |
| abstract_inverted_index.allowing | 112 |
| abstract_inverted_index.approach | 93 |
| abstract_inverted_index.branches | 20 |
| abstract_inverted_index.directly | 40 |
| abstract_inverted_index.ensuring | 109 |
| abstract_inverted_index.function | 123, 163, 179 |
| abstract_inverted_index.generate | 136 |
| abstract_inverted_index.inherent | 32 |
| abstract_inverted_index.original | 14, 121 |
| abstract_inverted_index.overlook | 71 |
| abstract_inverted_index.patched, | 17 |
| abstract_inverted_index.patches. | 86 |
| abstract_inverted_index.porting, | 55 |
| abstract_inverted_index.porting. | 150 |
| abstract_inverted_index.semantic | 73 |
| abstract_inverted_index.software | 4 |
| abstract_inverted_index.superior | 191 |
| abstract_inverted_index.utilizes | 131 |
| abstract_inverted_index.Branching | 0 |
| abstract_inverted_index.LLM-based | 92 |
| abstract_inverted_index.Mystique, | 89 |
| abstract_inverted_index.automated | 60 |
| abstract_inverted_index.branches, | 35 |
| abstract_inverted_index.branches. | 208 |
| abstract_inverted_index.efficient | 3 |
| abstract_inverted_index.essential | 72 |
| abstract_inverted_index.function, | 139 |
| abstract_inverted_index.function. | 128 |
| abstract_inverted_index.projects, | 195 |
| abstract_inverted_index.propagate | 10 |
| abstract_inverted_index.syntactic | 75, 110 |
| abstract_inverted_index.approaches | 63, 173 |
| abstract_inverted_index.evaluation | 152, 187 |
| abstract_inverted_index.fine-tuned | 133 |
| abstract_inverted_index.generality | 192 |
| abstract_inverted_index.increasing | 56 |
| abstract_inverted_index.languages. | 199 |
| abstract_inverted_index.real-world | 206 |
| abstract_inverted_index.signatures | 117 |
| abstract_inverted_index.statements | 103 |
| abstract_inverted_index.successful | 149 |
| abstract_inverted_index.vulnerable | 22, 127, 207 |
| abstract_inverted_index.development | 5 |
| abstract_inverted_index.facilitates | 2 |
| abstract_inverted_index.iteratively | 143 |
| abstract_inverted_index.programming | 198 |
| abstract_inverted_index.Mystique’s | 190 |
| abstract_inverted_index.correctness, | 111 |
| abstract_inverted_index.demonstrates | 189 |
| abstract_inverted_index.limitations. | 97 |
| abstract_inverted_index.repositories | 1 |
| abstract_inverted_index.successfully | 27, 201 |
| abstract_inverted_index.discrepancies | 33 |
| abstract_inverted_index.inadvertently | 9 |
| abstract_inverted_index.intervention, | 45 |
| abstract_inverted_index.outperforming | 171 |
| abstract_inverted_index.vulnerability | 57, 78, 107 |
| abstract_inverted_index.time-consuming | 48 |
| abstract_inverted_index.semantic-related | 102 |
| abstract_inverted_index.state-of-the-art | 172 |
| abstract_inverted_index.vulnerabilities. | 11 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 8 |
| citation_normalized_percentile.value | 0.30632903 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |