
Li, R., Allal, L. B., Zi, Y., Muennighoff, N., Kocetkov,
D., Mou, C., Marone, M., and et al. (2023). Star-
coder: May the source be with you! arXiv preprint
arXiv:2305.06161.
Li, Y., Wang, S., and Nguyen, T. N. (2022). Vulnerabil-
ity detection with fine-grained interpretations. In Pro-
ceedings of the 29th ACM Joint Meeting on European
Software Engineering Conference and Symposium on
the Foundations of Software Engineering, pages 292–
303. ACM.
Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y., and Chen, Z. (2021).
Sysevr: A framework for using deep learning to detect
software vulnerabilities. IEEE Transactions on De-
pendable and Secure Computing, 19(4):2244–2258.
Li, Z., Zou, D., Xu, S., Ou, X., Jin, H., Wang, S.,
Deng, Z., and Zhong, Y. (2018). Vuldeepecker: A
deep learning-based system for vulnerability detec-
tion. arXiv preprint arXiv:1801.01681.
Lu, G., Ju, X., Chen, X., Pei, W., and Cai, Z. (2024).
Grace: Empowering llm-based software vulnerability
detection with graph structure and in-context learning.
Journal of Systems and Software, 212.
Ma, H., Zhang, C., Bian, Y., Liu, L., Zhang, Z., Zhao,
P., Zhang, S., Fu, H., Hu, Q., and Wu, B. (2023).
Fairness-guided few-shot prompting for large lan-
guage models. In Advances in Neural Information
Processing Systems, volume 36, pages 43136–43155.
Nashid, N., Sintaha, M., and Mesbah, A. (2023). Retrieval-
based prompt selection for code-related few-shot
learning. In 2023 IEEE/ACM 45th International Con-
ference on Software Engineering (ICSE), pages 2450–
2462. IEEE.
Nguyen, V.-A., Nguyen, D. Q., Nguyen, V., Le, T., Tran,
Q. H., and Phung, D. (2022). Regvd: Revisiting graph
neural networks for vulnerability detection. In Pro-
ceedings of the ACM/IEEE 44th International Confer-
ence on Software Engineering: Companion Proceed-
ings, pages 178–182. ACM.
Russell, R. and et al. (2018). Automated vulnerability de-
tection in source code using deep representation learn-
ing. In 2018 17th IEEE International Conference on
Machine Learning and Applications (ICMLA), pages
757–762, Orlando, FL, USA.
Teyar, A. (2023). Burpgpt: Chatgpt powered automated
vulnerability detection tool. https://burpgpt.app/#faq.
Wu, Y., Lu, J., Zhang, Y., and Jin, S. (2021). Vulnerabil-
ity detection in c/c++ source code with graph repre-
sentation learning. In 2021 IEEE 11th Annual Com-
puting and Communication Workshop and Conference
(CCWC), pages 1519–1524. IEEE.
Ye, X. and Durrett, G. (2022). The unreliability of expla-
nations in few-shot prompting for textual reasoning.
Advances in Neural Information Processing Systems,
35:30378–30392.
Yun, S., Lin, S., Gu, X., and Shen, B. (2024). Project-
specific code summarization with in-context learning.
Journal of Systems and Software, 216.
Zhang, Q., Singh, C., Liu, L., Liu, X., Yu, B., Gao, J., and
Zhao, T. (2024). Tell your model where to attend:
Post-hoc attention steering for llms. arXiv preprint
arXiv:2311.02262.
Zhou, K., Yang, J., Loy, C. C., and Liu, Z. (2022). Con-
ditional prompt learning for vision-language models.
In Proceedings of the IEEE/CVF Conference on Com-
puter Vision and Pattern Recognition, pages 16816–
16825.
Zhou, P., Shi, W., Tian, J., Qi, Z., Li, B., Hao, H., and Xu,
B. (2016). Attention based bidirectional long short-
term memory networks for relation classification. In
Proceedings of the 54th Annual Meeting of the Associ-
ation for Computational Linguistics (Volume 2: Short
Papers), pages 207–212.
Zhou, Y., Liu, S., Siow, J., Du, X., and Liu, Y. (2019). De-
vign: Effective vulnerability identification by learning
comprehensive program semantics via graph neural
networks. Advances in Neural Information Process-
ing Systems, 32.
C¸ etin, O., Ekmekcioglu, E., Arief, B., and Hernandez-
Castro, J. (2024). An empirical evaluation of large
language models in static code analysis for php vul-
nerability detection. Journal of Universal Computer
Science, 30(9):1163–1183.
VP-IAFSP: Vulnerability Prediction Using Information Augmented Few-Shot Prompting with Open Source LLMs
599