Recurring Vulnerability Detection: How Far Are We? Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1145/3728901
With the rapid development of open-source software, code reuse has become a common practice to accelerate development. However, it leads to inheritance from the original vulnerability, which recurs at the reusing projects, known as recurring vulnerabilities (RVs). Traditional general-purpose vulnerability detection approaches struggle with scalability and adaptability, while learning-based approaches are often constrained by limited training datasets and are less effective against unseen vulnerabilities. Though specific recurring vulnerability detection (RVD) approaches have been proposed, their effectiveness across various RV characteristics remains unclear. In this paper, we conduct a large-scale empirical study using a newly constructed RV dataset containing 4,569 RVs, achieving a 953% expansion over prior RV datasets. Our study analyzes the characteristics of RVs, evaluates the effectiveness of the state-of-the-art RVD approaches, and investigates the root causes of false positives and false negatives, yielding key insights. Inspired by these insights, we design AntMan, a novel RVD approach that identifies both explicit and implicit call relations with modified functions, then employs inter-procedural taint analysis and intra-procedural dependency slicing within those functions to generate comprehensive signatures, and finally incorporates a flexible matching to detect RVs. Our evaluation has shown the effectiveness, generality and practical usefulness in RVD. AntManhas detected 4,593 RVs, with 307 confirmed by developers, and identified 73 new 0-day vulnerabilities across 15 projects, receiving 5 CVE identifiers.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1145/3728901
- OA Status
- hybrid
- References
- 27
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4411522892
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4411522892Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1145/3728901Digital Object Identifier
- Title
-
Recurring Vulnerability Detection: How Far Are We?Work title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-06-22Full publication date if available
- Authors
-
Yuhua Cao, Susheng Wu, Ruisi Wang, Bihuan Chen, Yiheng Huang, Chenhao Lu, Zhuotong Zhou, Xin PengList of authors in order
- Landing page
-
https://doi.org/10.1145/3728901Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1145/3728901Direct OA link when available
- Concepts
-
Computer science, False positive paradox, Program slicing, Vulnerability (computing), False positives and false negatives, Dependency (UML), Reuse, Scalability, Key (lock), Generality, Adaptability, Comparability, Machine learning, Matching (statistics), Data mining, Artificial intelligence, Software, Computer security, Engineering, Statistics, Combinatorics, Psychology, Programming language, Database, Ecology, Psychotherapist, Waste management, Biology, MathematicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
27Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4411522892 |
|---|---|
| doi | https://doi.org/10.1145/3728901 |
| ids.doi | https://doi.org/10.1145/3728901 |
| ids.openalex | https://openalex.org/W4411522892 |
| fwci | 0.0 |
| type | article |
| title | Recurring Vulnerability Detection: How Far Are We? |
| biblio.issue | ISSTA |
| biblio.volume | 2 |
| biblio.last_page | 595 |
| biblio.first_page | 573 |
| topics[0].id | https://openalex.org/T10260 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9995999932289124 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Software Engineering Research |
| topics[1].id | https://openalex.org/T12423 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9972000122070312 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1712 |
| topics[1].subfield.display_name | Software |
| topics[1].display_name | Software Reliability and Analysis Research |
| topics[2].id | https://openalex.org/T12479 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9966999888420105 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Web Application Security Vulnerabilities |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8065687417984009 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C64869954 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6635262966156006 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1859747 |
| concepts[1].display_name | False positive paradox |
| concepts[2].id | https://openalex.org/C91071405 |
| concepts[2].level | 3 |
| concepts[2].score | 0.647506833076477 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1413145 |
| concepts[2].display_name | Program slicing |
| concepts[3].id | https://openalex.org/C95713431 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6377396583557129 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q631425 |
| concepts[3].display_name | Vulnerability (computing) |
| concepts[4].id | https://openalex.org/C112789634 |
| concepts[4].level | 3 |
| concepts[4].score | 0.5734598636627197 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q18207010 |
| concepts[4].display_name | False positives and false negatives |
| concepts[5].id | https://openalex.org/C19768560 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5277472138404846 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q320727 |
| concepts[5].display_name | Dependency (UML) |
| concepts[6].id | https://openalex.org/C206588197 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5081534385681152 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q846574 |
| concepts[6].display_name | Reuse |
| concepts[7].id | https://openalex.org/C48044578 |
| concepts[7].level | 2 |
| concepts[7].score | 0.5043128728866577 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q727490 |
| concepts[7].display_name | Scalability |
| concepts[8].id | https://openalex.org/C26517878 |
| concepts[8].level | 2 |
| concepts[8].score | 0.5009806156158447 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[8].display_name | Key (lock) |
| concepts[9].id | https://openalex.org/C2780767217 |
| concepts[9].level | 2 |
| concepts[9].score | 0.49383077025413513 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q5532421 |
| concepts[9].display_name | Generality |
| concepts[10].id | https://openalex.org/C177606310 |
| concepts[10].level | 2 |
| concepts[10].score | 0.4835953116416931 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q5674297 |
| concepts[10].display_name | Adaptability |
| concepts[11].id | https://openalex.org/C197947376 |
| concepts[11].level | 2 |
| concepts[11].score | 0.47152289748191833 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q5155608 |
| concepts[11].display_name | Comparability |
| concepts[12].id | https://openalex.org/C119857082 |
| concepts[12].level | 1 |
| concepts[12].score | 0.4459303021430969 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q2539 |
| concepts[12].display_name | Machine learning |
| concepts[13].id | https://openalex.org/C165064840 |
| concepts[13].level | 2 |
| concepts[13].score | 0.4151630401611328 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q1321061 |
| concepts[13].display_name | Matching (statistics) |
| concepts[14].id | https://openalex.org/C124101348 |
| concepts[14].level | 1 |
| concepts[14].score | 0.3911581337451935 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[14].display_name | Data mining |
| concepts[15].id | https://openalex.org/C154945302 |
| concepts[15].level | 1 |
| concepts[15].score | 0.3697003722190857 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[15].display_name | Artificial intelligence |
| concepts[16].id | https://openalex.org/C2777904410 |
| concepts[16].level | 2 |
| concepts[16].score | 0.35659849643707275 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[16].display_name | Software |
| concepts[17].id | https://openalex.org/C38652104 |
| concepts[17].level | 1 |
| concepts[17].score | 0.284814715385437 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[17].display_name | Computer security |
| concepts[18].id | https://openalex.org/C127413603 |
| concepts[18].level | 0 |
| concepts[18].score | 0.09702470898628235 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[18].display_name | Engineering |
| concepts[19].id | https://openalex.org/C105795698 |
| concepts[19].level | 1 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q12483 |
| concepts[19].display_name | Statistics |
| concepts[20].id | https://openalex.org/C114614502 |
| concepts[20].level | 1 |
| concepts[20].score | 0.0 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q76592 |
| concepts[20].display_name | Combinatorics |
| concepts[21].id | https://openalex.org/C15744967 |
| concepts[21].level | 0 |
| concepts[21].score | 0.0 |
| concepts[21].wikidata | https://www.wikidata.org/wiki/Q9418 |
| concepts[21].display_name | Psychology |
| concepts[22].id | https://openalex.org/C199360897 |
| concepts[22].level | 1 |
| concepts[22].score | 0.0 |
| concepts[22].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[22].display_name | Programming language |
| concepts[23].id | https://openalex.org/C77088390 |
| concepts[23].level | 1 |
| concepts[23].score | 0.0 |
| concepts[23].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[23].display_name | Database |
| concepts[24].id | https://openalex.org/C18903297 |
| concepts[24].level | 1 |
| concepts[24].score | 0.0 |
| concepts[24].wikidata | https://www.wikidata.org/wiki/Q7150 |
| concepts[24].display_name | Ecology |
| concepts[25].id | https://openalex.org/C542102704 |
| concepts[25].level | 1 |
| concepts[25].score | 0.0 |
| concepts[25].wikidata | https://www.wikidata.org/wiki/Q183257 |
| concepts[25].display_name | Psychotherapist |
| concepts[26].id | https://openalex.org/C548081761 |
| concepts[26].level | 1 |
| concepts[26].score | 0.0 |
| concepts[26].wikidata | https://www.wikidata.org/wiki/Q180388 |
| concepts[26].display_name | Waste management |
| concepts[27].id | https://openalex.org/C86803240 |
| concepts[27].level | 0 |
| concepts[27].score | 0.0 |
| concepts[27].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[27].display_name | Biology |
| concepts[28].id | https://openalex.org/C33923547 |
| concepts[28].level | 0 |
| concepts[28].score | 0.0 |
| concepts[28].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[28].display_name | Mathematics |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8065687417984009 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/false-positive-paradox |
| keywords[1].score | 0.6635262966156006 |
| keywords[1].display_name | False positive paradox |
| keywords[2].id | https://openalex.org/keywords/program-slicing |
| keywords[2].score | 0.647506833076477 |
| keywords[2].display_name | Program slicing |
| keywords[3].id | https://openalex.org/keywords/vulnerability |
| keywords[3].score | 0.6377396583557129 |
| keywords[3].display_name | Vulnerability (computing) |
| keywords[4].id | https://openalex.org/keywords/false-positives-and-false-negatives |
| keywords[4].score | 0.5734598636627197 |
| keywords[4].display_name | False positives and false negatives |
| keywords[5].id | https://openalex.org/keywords/dependency |
| keywords[5].score | 0.5277472138404846 |
| keywords[5].display_name | Dependency (UML) |
| keywords[6].id | https://openalex.org/keywords/reuse |
| keywords[6].score | 0.5081534385681152 |
| keywords[6].display_name | Reuse |
| keywords[7].id | https://openalex.org/keywords/scalability |
| keywords[7].score | 0.5043128728866577 |
| keywords[7].display_name | Scalability |
| keywords[8].id | https://openalex.org/keywords/key |
| keywords[8].score | 0.5009806156158447 |
| keywords[8].display_name | Key (lock) |
| keywords[9].id | https://openalex.org/keywords/generality |
| keywords[9].score | 0.49383077025413513 |
| keywords[9].display_name | Generality |
| keywords[10].id | https://openalex.org/keywords/adaptability |
| keywords[10].score | 0.4835953116416931 |
| keywords[10].display_name | Adaptability |
| keywords[11].id | https://openalex.org/keywords/comparability |
| keywords[11].score | 0.47152289748191833 |
| keywords[11].display_name | Comparability |
| keywords[12].id | https://openalex.org/keywords/machine-learning |
| keywords[12].score | 0.4459303021430969 |
| keywords[12].display_name | Machine learning |
| keywords[13].id | https://openalex.org/keywords/matching |
| keywords[13].score | 0.4151630401611328 |
| keywords[13].display_name | Matching (statistics) |
| keywords[14].id | https://openalex.org/keywords/data-mining |
| keywords[14].score | 0.3911581337451935 |
| keywords[14].display_name | Data mining |
| keywords[15].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[15].score | 0.3697003722190857 |
| keywords[15].display_name | Artificial intelligence |
| keywords[16].id | https://openalex.org/keywords/software |
| keywords[16].score | 0.35659849643707275 |
| keywords[16].display_name | Software |
| keywords[17].id | https://openalex.org/keywords/computer-security |
| keywords[17].score | 0.284814715385437 |
| keywords[17].display_name | Computer security |
| keywords[18].id | https://openalex.org/keywords/engineering |
| keywords[18].score | 0.09702470898628235 |
| keywords[18].display_name | Engineering |
| language | en |
| locations[0].id | doi:10.1145/3728901 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4404663975 |
| locations[0].source.issn | 2994-970X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2994-970X |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Proceedings of the ACM on software engineering. |
| locations[0].source.host_organization | https://openalex.org/P4310319798 |
| locations[0].source.host_organization_name | Association for Computing Machinery |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319798 |
| locations[0].source.host_organization_lineage_names | Association for Computing Machinery |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings of the ACM on Software Engineering |
| locations[0].landing_page_url | https://doi.org/10.1145/3728901 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5101821319 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Yuhua Cao |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[0].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[0].institutions[0].id | https://openalex.org/I24943067 |
| authorships[0].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Fudan University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Yiheng Cao |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[1].author.id | https://openalex.org/A5073610803 |
| authorships[1].author.orcid | https://orcid.org/0009-0005-2169-7032 |
| authorships[1].author.display_name | Susheng Wu |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[1].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[1].institutions[0].id | https://openalex.org/I24943067 |
| authorships[1].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Fudan University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Susheng Wu |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[2].author.id | https://openalex.org/A5034212098 |
| authorships[2].author.orcid | https://orcid.org/0009-0001-6794-0721 |
| authorships[2].author.display_name | Ruisi Wang |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[2].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[2].institutions[0].id | https://openalex.org/I24943067 |
| authorships[2].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Fudan University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Ruisi Wang |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[3].author.id | https://openalex.org/A5059253116 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-7238-7492 |
| authorships[3].author.display_name | Bihuan Chen |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[3].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[3].institutions[0].id | https://openalex.org/I24943067 |
| authorships[3].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Fudan University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Bihuan Chen |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[4].author.id | https://openalex.org/A5073898228 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Yiheng Huang |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[4].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[4].institutions[0].id | https://openalex.org/I24943067 |
| authorships[4].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Fudan University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Yiheng Huang |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[5].author.id | https://openalex.org/A5104187817 |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | Chenhao Lu |
| authorships[5].countries | CN |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[5].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[5].institutions[0].id | https://openalex.org/I24943067 |
| authorships[5].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[5].institutions[0].country_code | CN |
| authorships[5].institutions[0].display_name | Fudan University |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Chenhao Lu |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[6].author.id | https://openalex.org/A5109404532 |
| authorships[6].author.orcid | |
| authorships[6].author.display_name | Zhuotong Zhou |
| authorships[6].countries | CN |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[6].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[6].institutions[0].id | https://openalex.org/I24943067 |
| authorships[6].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[6].institutions[0].country_code | CN |
| authorships[6].institutions[0].display_name | Fudan University |
| authorships[6].author_position | middle |
| authorships[6].raw_author_name | Zhuotong Zhou |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Fudan University, Shanghai, China |
| authorships[7].author.id | https://openalex.org/A5101854992 |
| authorships[7].author.orcid | https://orcid.org/0000-0003-3376-2581 |
| authorships[7].author.display_name | Xin Peng |
| authorships[7].countries | CN |
| authorships[7].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[7].affiliations[0].raw_affiliation_string | Fudan University, Shanghai, China |
| authorships[7].institutions[0].id | https://openalex.org/I24943067 |
| authorships[7].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[7].institutions[0].type | education |
| authorships[7].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[7].institutions[0].country_code | CN |
| authorships[7].institutions[0].display_name | Fudan University |
| authorships[7].author_position | last |
| authorships[7].raw_author_name | Xin Peng |
| authorships[7].is_corresponding | False |
| authorships[7].raw_affiliation_strings | Fudan University, Shanghai, China |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1145/3728901 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Recurring Vulnerability Detection: How Far Are We? |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10260 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9995999932289124 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Software Engineering Research |
| related_works | https://openalex.org/W1557094818, https://openalex.org/W2183246718, https://openalex.org/W1973412793, https://openalex.org/W2099261052, https://openalex.org/W4292605373, https://openalex.org/W2951146195, https://openalex.org/W4226316650, https://openalex.org/W3123215897, https://openalex.org/W2153600354, https://openalex.org/W4243739114 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1145/3728901 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4404663975 |
| best_oa_location.source.issn | 2994-970X |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2994-970X |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Proceedings of the ACM on software engineering. |
| best_oa_location.source.host_organization | https://openalex.org/P4310319798 |
| best_oa_location.source.host_organization_name | Association for Computing Machinery |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319798 |
| best_oa_location.source.host_organization_lineage_names | Association for Computing Machinery |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings of the ACM on Software Engineering |
| best_oa_location.landing_page_url | https://doi.org/10.1145/3728901 |
| primary_location.id | doi:10.1145/3728901 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4404663975 |
| primary_location.source.issn | 2994-970X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2994-970X |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Proceedings of the ACM on software engineering. |
| primary_location.source.host_organization | https://openalex.org/P4310319798 |
| primary_location.source.host_organization_name | Association for Computing Machinery |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319798 |
| primary_location.source.host_organization_lineage_names | Association for Computing Machinery |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings of the ACM on Software Engineering |
| primary_location.landing_page_url | https://doi.org/10.1145/3728901 |
| publication_date | 2025-06-22 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W2891235722, https://openalex.org/W3117923638, https://openalex.org/W2145544369, https://openalex.org/W2766078311, https://openalex.org/W4308644396, https://openalex.org/W2741068848, https://openalex.org/W2885030880, https://openalex.org/W2509308811, https://openalex.org/W2962960733, https://openalex.org/W2104577574, https://openalex.org/W4384302844, https://openalex.org/W4388857323, https://openalex.org/W4388483660, https://openalex.org/W2028820179, https://openalex.org/W4411088274, https://openalex.org/W4391558518, https://openalex.org/W4301802532, https://openalex.org/W4388867283, https://openalex.org/W4238047884, https://openalex.org/W4300470068, https://openalex.org/W40327287, https://openalex.org/W2914982603, https://openalex.org/W4243766954, https://openalex.org/W4285162211, https://openalex.org/W1543330234, https://openalex.org/W4301329292, https://openalex.org/W4247885319 |
| referenced_works_count | 27 |
| abstract_inverted_index.5 | 215 |
| abstract_inverted_index.a | 11, 87, 92, 101, 144, 178 |
| abstract_inverted_index.15 | 212 |
| abstract_inverted_index.73 | 207 |
| abstract_inverted_index.In | 82 |
| abstract_inverted_index.RV | 78, 95, 106 |
| abstract_inverted_index.as | 33 |
| abstract_inverted_index.at | 28 |
| abstract_inverted_index.by | 53, 138, 203 |
| abstract_inverted_index.in | 194 |
| abstract_inverted_index.it | 18 |
| abstract_inverted_index.of | 4, 113, 118, 128 |
| abstract_inverted_index.to | 14, 20, 171, 181 |
| abstract_inverted_index.we | 85, 141 |
| abstract_inverted_index.307 | 201 |
| abstract_inverted_index.CVE | 216 |
| abstract_inverted_index.Our | 108, 184 |
| abstract_inverted_index.RVD | 121, 146 |
| abstract_inverted_index.and | 45, 57, 123, 131, 152, 164, 175, 191, 205 |
| abstract_inverted_index.are | 50, 58 |
| abstract_inverted_index.has | 9, 186 |
| abstract_inverted_index.key | 135 |
| abstract_inverted_index.new | 208 |
| abstract_inverted_index.the | 1, 23, 29, 111, 116, 119, 125, 188 |
| abstract_inverted_index.953% | 102 |
| abstract_inverted_index.RVD. | 195 |
| abstract_inverted_index.RVs, | 99, 114, 199 |
| abstract_inverted_index.RVs. | 183 |
| abstract_inverted_index.With | 0 |
| abstract_inverted_index.been | 72 |
| abstract_inverted_index.both | 150 |
| abstract_inverted_index.call | 154 |
| abstract_inverted_index.code | 7 |
| abstract_inverted_index.from | 22 |
| abstract_inverted_index.have | 71 |
| abstract_inverted_index.less | 59 |
| abstract_inverted_index.over | 104 |
| abstract_inverted_index.root | 126 |
| abstract_inverted_index.that | 148 |
| abstract_inverted_index.then | 159 |
| abstract_inverted_index.this | 83 |
| abstract_inverted_index.with | 43, 156, 200 |
| abstract_inverted_index.(RVD) | 69 |
| abstract_inverted_index.0-day | 209 |
| abstract_inverted_index.4,569 | 98 |
| abstract_inverted_index.4,593 | 198 |
| abstract_inverted_index.false | 129, 132 |
| abstract_inverted_index.known | 32 |
| abstract_inverted_index.leads | 19 |
| abstract_inverted_index.newly | 93 |
| abstract_inverted_index.novel | 145 |
| abstract_inverted_index.often | 51 |
| abstract_inverted_index.prior | 105 |
| abstract_inverted_index.rapid | 2 |
| abstract_inverted_index.reuse | 8 |
| abstract_inverted_index.shown | 187 |
| abstract_inverted_index.study | 90, 109 |
| abstract_inverted_index.taint | 162 |
| abstract_inverted_index.their | 74 |
| abstract_inverted_index.these | 139 |
| abstract_inverted_index.those | 169 |
| abstract_inverted_index.using | 91 |
| abstract_inverted_index.which | 26 |
| abstract_inverted_index.while | 47 |
| abstract_inverted_index.(RVs). | 36 |
| abstract_inverted_index.Though | 64 |
| abstract_inverted_index.across | 76, 211 |
| abstract_inverted_index.become | 10 |
| abstract_inverted_index.causes | 127 |
| abstract_inverted_index.common | 12 |
| abstract_inverted_index.design | 142 |
| abstract_inverted_index.detect | 182 |
| abstract_inverted_index.paper, | 84 |
| abstract_inverted_index.recurs | 27 |
| abstract_inverted_index.unseen | 62 |
| abstract_inverted_index.within | 168 |
| abstract_inverted_index.AntMan, | 143 |
| abstract_inverted_index.against | 61 |
| abstract_inverted_index.conduct | 86 |
| abstract_inverted_index.dataset | 96 |
| abstract_inverted_index.employs | 160 |
| abstract_inverted_index.finally | 176 |
| abstract_inverted_index.limited | 54 |
| abstract_inverted_index.remains | 80 |
| abstract_inverted_index.reusing | 30 |
| abstract_inverted_index.slicing | 167 |
| abstract_inverted_index.various | 77 |
| abstract_inverted_index.However, | 17 |
| abstract_inverted_index.Inspired | 137 |
| abstract_inverted_index.analysis | 163 |
| abstract_inverted_index.analyzes | 110 |
| abstract_inverted_index.approach | 147 |
| abstract_inverted_index.datasets | 56 |
| abstract_inverted_index.detected | 197 |
| abstract_inverted_index.explicit | 151 |
| abstract_inverted_index.flexible | 179 |
| abstract_inverted_index.generate | 172 |
| abstract_inverted_index.implicit | 153 |
| abstract_inverted_index.matching | 180 |
| abstract_inverted_index.modified | 157 |
| abstract_inverted_index.original | 24 |
| abstract_inverted_index.practice | 13 |
| abstract_inverted_index.specific | 65 |
| abstract_inverted_index.struggle | 42 |
| abstract_inverted_index.training | 55 |
| abstract_inverted_index.unclear. | 81 |
| abstract_inverted_index.yielding | 134 |
| abstract_inverted_index.AntManhas | 196 |
| abstract_inverted_index.achieving | 100 |
| abstract_inverted_index.confirmed | 202 |
| abstract_inverted_index.datasets. | 107 |
| abstract_inverted_index.detection | 40, 68 |
| abstract_inverted_index.effective | 60 |
| abstract_inverted_index.empirical | 89 |
| abstract_inverted_index.evaluates | 115 |
| abstract_inverted_index.expansion | 103 |
| abstract_inverted_index.functions | 170 |
| abstract_inverted_index.insights, | 140 |
| abstract_inverted_index.insights. | 136 |
| abstract_inverted_index.positives | 130 |
| abstract_inverted_index.practical | 192 |
| abstract_inverted_index.projects, | 31, 213 |
| abstract_inverted_index.proposed, | 73 |
| abstract_inverted_index.receiving | 214 |
| abstract_inverted_index.recurring | 34, 66 |
| abstract_inverted_index.relations | 155 |
| abstract_inverted_index.software, | 6 |
| abstract_inverted_index.accelerate | 15 |
| abstract_inverted_index.approaches | 41, 49, 70 |
| abstract_inverted_index.containing | 97 |
| abstract_inverted_index.dependency | 166 |
| abstract_inverted_index.evaluation | 185 |
| abstract_inverted_index.functions, | 158 |
| abstract_inverted_index.generality | 190 |
| abstract_inverted_index.identified | 206 |
| abstract_inverted_index.identifies | 149 |
| abstract_inverted_index.negatives, | 133 |
| abstract_inverted_index.usefulness | 193 |
| abstract_inverted_index.Traditional | 37 |
| abstract_inverted_index.approaches, | 122 |
| abstract_inverted_index.constrained | 52 |
| abstract_inverted_index.constructed | 94 |
| abstract_inverted_index.developers, | 204 |
| abstract_inverted_index.development | 3 |
| abstract_inverted_index.inheritance | 21 |
| abstract_inverted_index.large-scale | 88 |
| abstract_inverted_index.open-source | 5 |
| abstract_inverted_index.scalability | 44 |
| abstract_inverted_index.signatures, | 174 |
| abstract_inverted_index.development. | 16 |
| abstract_inverted_index.identifiers. | 217 |
| abstract_inverted_index.incorporates | 177 |
| abstract_inverted_index.investigates | 124 |
| abstract_inverted_index.adaptability, | 46 |
| abstract_inverted_index.comprehensive | 173 |
| abstract_inverted_index.effectiveness | 75, 117 |
| abstract_inverted_index.vulnerability | 39, 67 |
| abstract_inverted_index.effectiveness, | 189 |
| abstract_inverted_index.learning-based | 48 |
| abstract_inverted_index.vulnerability, | 25 |
| abstract_inverted_index.characteristics | 79, 112 |
| abstract_inverted_index.general-purpose | 38 |
| abstract_inverted_index.vulnerabilities | 35, 210 |
| abstract_inverted_index.inter-procedural | 161 |
| abstract_inverted_index.intra-procedural | 165 |
| abstract_inverted_index.state-of-the-art | 120 |
| abstract_inverted_index.vulnerabilities. | 63 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 8 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.5 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.31446494 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |