Utilize este identificador para referenciar este registo: http://hdl.handle.net/10071/37287
Registo completo
Campo DCValorIdioma
dc.contributor.authorGaleano, M. C.-
dc.contributor.authorGasiba, T.-
dc.contributor.authorAmburi, S.-
dc.contributor.authorPinto-Albuquerque, M.-
dc.contributor.editorQueirós, Ricardo-
dc.contributor.editorPinto, Mário-
dc.contributor.editorPortela, Filipe-
dc.contributor.editorSimões, Alberto-
dc.date.accessioned2026-05-18T10:33:26Z-
dc.date.available2026-05-18T10:33:26Z-
dc.date.issued2025-
dc.identifier.citationGaleano, M. C., Gasiba, T., Amburi, S., & Pinto-Albuquerque, M. (2025). Are we there yet?: On security vulnerabilities produced by open source generative AI models and Its Implications for security education. In R. Queirós, M., F. Portela, & A. Simões (Eds.), 6th International Computer Programming Education Conference (ICPEC 2025). Schloss Dagstuhl. https://doi.org/10.4230/OASIcs.ICPEC.2025.9-
dc.identifier.isbn978-3-95977-393-5-
dc.identifier.issn2190-6807-
dc.identifier.urihttp://hdl.handle.net/10071/37287-
dc.description.abstractWith the increasing integration of large language models (LLMs) into software development and programming education, concerns have emerged about the security of AI-generated code. This study investigates the security of three open source code generation models. Codestral, DeepSeek R1, and LLaMA 3.3 70B using structured prompts in Python, C, and Java. Some prompts were designed to explicitly trigger known vulnerability patterns, such as unsanitized input handling or unsafe memory operations, in order to assess how each model responds to security-sensitive tasks. The findings reveal recurring issues, including command execution vulnerabilities, insecure memory handling, and insufficient input validation. In response, we propose a set of recommendations for integrating secure prompt design and code auditing practices into developer training. These guidelines aim to help future developers generate safer code and better identify flaws in GenAIgenerated output. This work offers an initial analysis of the limitations of GenAI-assisted code generation and provides actionable strategies to support the more secure and responsible use of these tools in professional and educational contexts.eng
dc.language.isoeng-
dc.publisherSchloss Dagstuhl-
dc.relationinfo:eu-repo/grantAgreement/FCT/Concurso de avaliação no âmbito do Programa Plurianual de Financiamento de Unidades de I&D (2017%2F2018) - Financiamento Programático/UIDP%2F04466%2F2020/PT-
dc.relation.ispartof6th International Computer Programming Education Conference (ICPEC 2025)-
dc.rightsopenAccess-
dc.subjectGenerative AIeng
dc.subjectCode securityeng
dc.subjectProgramming educationeng
dc.subjectPrompt engineeringeng
dc.subjectSecure codingeng
dc.subjectStatistc analysiseng
dc.titleAre we there yet?: On security vulnerabilities produced by open source generative AI models and Its Implications for security educationeng
dc.typeconferenceObject-
dc.event.title6th International Computer Programming Education Conference-ICPEC-
dc.event.typeConferênciapt
dc.event.date2025-
dc.peerreviewedyes-
dc.volume133-
dc.date.updated2026-05-18T11:39:23Z-
dc.description.versioninfo:eu-repo/semantics/publishedVersion-
dc.subject.fosDomínio/Área Científica::Ciências Naturais::Matemáticaspor
dc.subject.fosDomínio/Área Científica::Ciências Sociais::Geografia Económica e Socialpor
iscte.identifier.cienciahttps://ciencia.iscte-iul.pt/id/ci-pub-116622-
iscte.alternateIdentifiers.wosWOS:001748591000009-
Aparece nas coleções:ISTAR-CRI - Comunicações a conferências internacionais

Ficheiros deste registo:
Ficheiro TamanhoFormato 
conferenceObject_116622.pdf555,83 kBAdobe PDFVer/Abrir


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpaceOrkut
Formato BibTex mendeley Endnote Logotipo do DeGóis Logotipo do Orcid 

Todos os registos no repositório estão protegidos por leis de copyright, com todos os direitos reservados.