ICSME 2025
Sun 7 - Fri 12 September 2025 Auckland, New Zealand
Fri 12 Sep 2025 16:00 - 16:15 at Case Room 3 260-055 - Session 17 - Security 3 Chair(s): Valerio Terragni

Modern software systems are increasingly complex, presenting significant challenges in quality assurance. Just-intime vulnerability prediction (JIT-VP) is a proactive approach to identifying vulnerable commits and providing early warnings about potential security risks. However, we observe that current JIT-VP evaluations rely on an idealized setting, where the evaluation datasets are artificially balanced, consisting exclusively of vulnerability-introducing and vulnerability-fixing commits.

To address this limitation, this study assesses the effectiveness of JIT-VP techniques under a more realistic setting that includes both vulnerability-related and vulnerability-neutral commits. To enable a reliable evaluation, we introduce a large-scale public dataset comprising over one million commits from FFmpeg and the Linux kernel. Our empirical analysis of eight state-of-theart JIT-VP techniques reveals a significant decline in predictive performance when applied to real-world conditions; for example, the average PR-AUC on Linux drops 98% from 0.805 to 0.016.

This discrepancy is mainly attributed to the severe class imbalance in real-world datasets, where vulnerability-introducing commits constitute only a small fraction of all commits. To mitigate this issue, we explore the effectiveness of widely adopted techniques for handling dataset imbalance, including customized loss functions, oversampling, and undersampling. Surprisingly, our experimental results indicate that these techniques are ineffective in addressing the imbalance problem in JIT-VP. These findings underscore the importance of realistic evaluations of JIT-VP and the need for domain-specific techniques to address data imbalance in such scenarios.

Fri 12 Sep

Displayed time zone: Auckland, Wellington change

15:30 - 16:30
Session 17 - Security 3Research Papers Track at Case Room 3 260-055
Chair(s): Valerio Terragni University of Auckland
15:30
15m
LLM-SZZ: Novel Vulnerability Affected Range Identification Driven by Large Language Model and CVE Description
Research Papers Track
Siqi Fan Lanzhou University, Xin Liu Lanzhou University, Yingli Zhang Lanzhou University, Yuan Tan Lanzhou University, Luxing Yin Lanzhou University, Zhaorun Chen University of Chicago, Song Li The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Lei Qiao Lanzhou University, Rui Zhou Lanzhou University
15:45
15m
Enhanced Vulnerability Localization: Harmonizing Task-Enhanced Tuning and General LLM Prompting
Research Papers Track
Wentong Tian Beihang University, Yuanzhang Lin Beihang University, Xiang Gao Beihang University, Hailong Sun Beihang University
16:00
15m
Toward Realistic Evaluations of Just-In-Time Vulnerability Prediction
Research Papers Track
Duong Nguyen Hanoi University of Science and Technology, Le-Cong Thanh The University of Melbourne, Triet Le The University of Adelaide, Muhammad Ali Babar School of Computer Science, The University of Adelaide, Quyet Thang Huynh Hanoi University of Science and Technology