ICSME 2025
Sun 7 - Fri 12 September 2025 Auckland, New Zealand
Fri 12 Sep 2025 15:30 - 15:45 at Case Room 3 260-055 - Session 17 - Security 3 Chair(s): Valerio Terragni

The SZZ method and its variants are extensively utilized in the identification of the vulnerability affected range, predominantly through the analysis of bug-fixing commits to trace back to bug-inducing commits. However, these methods generally suffer from low precision due to two main factors: 1) Current learning-based approaches rely solely on code to identify root cause deletion lines, which often leads to incorrect results. 2) The tracing capabilities of existing SZZ methods are insufficient when dealing with complex vulnerabilities, especially those in early software versions, due to their reliance on line mapping algorithm.

To address these issues, this paper innovatively incorporates natural language information from commit metadata, combined with large language models, to more accurately capture the true root cause line of vulnerabilities, thereby achieving precise localization of the vulnerability’s impact range. Experimental results indicate that our proposed LLM-SZZ method outperforms existing state-of-the-art approaches, achieving over a 16% increase in precision across datasets in various programming languages, demonstrating a significant performance advantage.

Fri 12 Sep

Displayed time zone: Auckland, Wellington change

15:30 - 16:30
Session 17 - Security 3Research Papers Track at Case Room 3 260-055
Chair(s): Valerio Terragni University of Auckland
15:30
15m
LLM-SZZ: Novel Vulnerability Affected Range Identification Driven by Large Language Model and CVE Description
Research Papers Track
Siqi Fan Lanzhou University, Xin Liu Lanzhou University, Yingli Zhang Lanzhou University, Yuan Tan Lanzhou University, Luxing Yin Lanzhou University, Zhaorun Chen University of Chicago, Song Li The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Lei Qiao Lanzhou University, Rui Zhou Lanzhou University
15:45
15m
Enhanced Vulnerability Localization: Harmonizing Task-Enhanced Tuning and General LLM Prompting
Research Papers Track
Wentong Tian Beihang University, Yuanzhang Lin Beihang University, Xiang Gao Beihang University, Hailong Sun Beihang University
16:00
15m
Toward Realistic Evaluations of Just-In-Time Vulnerability Prediction
Research Papers Track
Duong Nguyen Hanoi University of Science and Technology, Le-Cong Thanh The University of Melbourne, Triet Le The University of Adelaide, Muhammad Ali Babar School of Computer Science, The University of Adelaide, Quyet Thang Huynh Hanoi University of Science and Technology