Accepted
Vercation: Precise Vulnerable Open-source Software Versions Identification based on Static Analysis and LLM
IEEE Transactions on Software Engineering
Link
IEEE Transactions on Software Engineering
Link
Back to the Basics: Rethinking Issue-Commit Linking with LLM-Assisted Retrieval
48th IEEE/ACM International Conference on Software Engineering (ICSE 2026)
Link
48th IEEE/ACM International Conference on Software Engineering (ICSE 2026)
Link
Let the Trial Begin: A Mock-Court Approach to Vulnerability Detection using LLM-Based Agents
48th IEEE/ACM International Conference on Software Engineering (ICSE 2026)
Link
48th IEEE/ACM International Conference on Software Engineering (ICSE 2026)
Link
Out of Distribution, Out of Luck: How Well Can LLMs Trained on Vulnerability Datasets Detect Top 25 CWE Weaknesses?
48th IEEE/ACM International Conference on Software Engineering (ICSE 2026)
Link
48th IEEE/ACM International Conference on Software Engineering (ICSE 2026)
Link
PenForge: On-the-Fly Expert Agent Construction for Automated Penetration Testing
48th IEEE/ACM International Conference on Software Engineering (ICSE 2026) New Ideas and Emerging Results Track
48th IEEE/ACM International Conference on Software Engineering (ICSE 2026) New Ideas and Emerging Results Track
Received Major Revision
Revisiting Vulnerability Patch Identification
on Data in the Wild
ACM Transactions on Software Engineering and Methodology
Link
ACM Transactions on Software Engineering and Methodology
Link
CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics
ACM Transactions on Software Engineering and Methodology
Link
ACM Transactions on Software Engineering and Methodology
Link
Mapping NVD Records to their VFCs: How Hard is it?
ACM Transactions on Software Engineering and Methodology
Link
ACM Transactions on Software Engineering and Methodology
Link
Beyond ChatGPT: Enhancing Software Quality Assurance Tasks with Diverse LLMs and Validation Techniques
ACM Transactions on Software Engineering and Methodology
Link
ACM Transactions on Software Engineering and Methodology
Link
Fixseeker: An Empirical Driven Graph-based Approach for Detecting Silent Vulnerability Fixes in Open Source Software
ACM Transactions on Software Engineering and Methodology
Link
ACM Transactions on Software Engineering and Methodology
Link
Submitted
Benchmarking Large Language Models for Multi-Language Software Vulnerability Detection
Link
Link
VulCoCo: A Simple Yet Effective Method for Detecting Vulnerable Code Clones
Link
Link
R2Vul: Learning to Reason about Software Vulnerabilities with Reinforcement Learning and Structured Reasoning Distillation
Link
Link
PatchSeeker: Mapping NVD Records to their Vulnerability-fixing Commits with LLM Generated Commits and Embeddings
Link
Link
Semantics-Aligned, Curriculum-Driven, and Reasoning-Enhanced Vulnerability Repair Framework
Link
Link
SecureAgentBench: Benchmarking Secure Code Generation under Realistic Vulnerability Scenarios
Link
Link