{"id":"https://openalex.org/W7131404278","doi":"https://doi.org/10.48550/arxiv.2602.20213","title":"CodeHacker: Automated Test Case Generation for Detecting Vulnerabilities in Competitive Programming Solutions","display_name":"CodeHacker: Automated Test Case Generation for Detecting Vulnerabilities in Competitive Programming Solutions","publication_year":2026,"publication_date":"2026-02-23","ids":{"openalex":"https://openalex.org/W7131404278","doi":"https://doi.org/10.48550/arxiv.2602.20213"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.20213","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126788842","display_name":"Jingwei Shi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shi, Jingwei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126842873","display_name":"Xinxiang Yin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yin, Xinxiang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126836170","display_name":"Jing Huang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Huang, Jing","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124860950","display_name":"Jinman Zhao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhao, Jinman","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5126786657","display_name":"Shengyu Tao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tao, Shengyu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5126788842"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.6575000286102295,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.6575000286102295,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.13210000097751617,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.050999999046325684,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7554000020027161},{"id":"https://openalex.org/keywords/validator","display_name":"Validator","score":0.6075000166893005},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5900999903678894},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.5662000179290771},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.522599995136261},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.43309998512268066},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4153999984264374},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.39660000801086426}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7788000106811523},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7554000020027161},{"id":"https://openalex.org/C35292069","wikidata":"https://www.wikidata.org/wiki/Q1575458","display_name":"Validator","level":2,"score":0.6075000166893005},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5900999903678894},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.5662000179290771},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.522599995136261},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.48100000619888306},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44929999113082886},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.43309998512268066},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4153999984264374},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.39660000801086426},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.35659998655319214},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3443000018596649},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.3411000072956085},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.304500013589859},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C151552104","wikidata":"https://www.wikidata.org/wiki/Q7705809","display_name":"Test suite","level":4,"score":0.2766999900341034},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.2581000030040741},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.2578999996185303},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.25279998779296875},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.25279998779296875}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.20213","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.20213","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.20213","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.20213","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.678534984588623}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"evaluation":[1],"of":[2,17,91,127,152],"Large":[3],"Language":[4],"Models":[5],"(LLMs)":[6],"for":[7,26],"code":[8,83],"generation":[9],"relies":[10],"heavily":[11],"on":[12,155],"the":[13,61,87,100,122,150],"quality":[14],"and":[15,77,89,107],"robustness":[16],"test":[18,51],"cases.":[19],"However,":[20],"existing":[21,128],"benchmarks":[22,156],"often":[23],"lack":[24],"coverage":[25],"subtle":[27],"corner":[28],"cases,":[29],"allowing":[30],"incorrect":[31,133],"solutions":[32,134],"to":[33,47,80,144],"pass.":[34],"To":[35,85],"bridge":[36],"this":[37],"gap,":[38],"we":[39,94],"propose":[40],"CodeHacker,":[41],"an":[42],"automated":[43],"agent":[44,101],"framework":[45],"dedicated":[46],"generating":[48],"targeted":[49],"adversarial":[50,111,141],"cases":[52,142],"that":[53,118,135],"expose":[54],"latent":[55],"vulnerabilities":[56],"in":[57,64],"program":[58],"submissions.":[59,84],"Mimicking":[60],"hack":[62],"mechanism":[63],"competitive":[65],"programming,":[66],"CodeHacker":[67,119],"employs":[68],"a":[69,96],"multi-strategy":[70],"approach,":[71],"including":[72],"stress":[73],"testing,":[74],"anti-hash":[75],"attacks,":[76,93],"logic-specific":[78],"targeting":[79],"break":[81],"specific":[82],"ensure":[86],"validity":[88],"reliability":[90],"these":[92],"introduce":[95],"Calibration":[97],"Phase,":[98],"where":[99],"iteratively":[102],"refines":[103],"its":[104],"own":[105],"Validator":[106],"Checker":[108],"via":[109],"self-generated":[110],"probes":[112],"before":[113],"evaluating":[114],"contestant":[115],"code.Experiments":[116],"demonstrate":[117],"significantly":[120],"improves":[121],"True":[123],"Negative":[124],"Rate":[125],"(TNR)":[126],"datasets,":[129],"effectively":[130],"filtering":[131],"out":[132],"were":[136],"previously":[137],"accepted.":[138],"Furthermore,":[139],"generated":[140],"prove":[143],"be":[145],"superior":[146],"training":[147],"data,":[148],"boosting":[149],"performance":[151],"RL-trained":[153],"models":[154],"like":[157],"LiveCodeBench.":[158]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-26T00:00:00"}
