Articles
| Open Access | Toward an Integrated AI‑Driven Framework for Secure Code Transformation and Vulnerability Detection
Arjun Mehta , Department of Computer Science, GlobalTech UniversityAbstract
The confluence of advances in machine learning, code translation, and automated security analysis presents transformative potential for modern software engineering. This article proposes a conceptual, integrated framework that leverages unsupervised code translation, large language models (LLMs) for code editing, and AI-enabled vulnerability detection, to enhance both code portability and security assurance. Drawing upon recent work in unsupervised programming language translation (Lachaux, Roziere, Chanussot & Lample, 2020), performance‑improving code edits via learning (Shypula et al., 2023), zero‑shot vulnerability repair with LLMs (Pearce et al., 2023), and broader surveys of AI‑assisted big code understanding (Wong et al., 2023), the framework emphasizes an iterative pipeline: translate → adapt → secure. Additionally, we integrate insights from research on AI-based vulnerability detection in enterprise contexts (Rajapaksha et al., 2023; Behfar, 2023), semantic deduplication of security findings (Gulraiz, 202x), and compliance automation (Amaral et al., 2021; Areo, 2021), to support compliance and operational deployment. Through detailed theoretical elaboration, we examine potential benefits, challenges, limitations, and future directions. We argue that such a unified pipeline can significantly reduce the human burden in cross-language migration and bolster resilience against security vulnerabilities, while acknowledging risks such as over-reliance on AI, calibration, and regulatory compliance.
Keywords
AI-assisted programming, code translation, vulnerability detection, software security
References
Lachaux, M. A.; Roziere, B.; Chanussot, L.; Lample, G. Unsupervised translation of programming languages. arXiv, 2020, arXiv:2006.03511.
Shypula, A.; Madaan, A.; Zeng, Y.; Alon, U.; Gardner, J.; Hashemi, M.; Neubig, G.; Ranganathan, P.; Bastani, O.; Yazdanbakhsh, A. Learning performance-improving code edits. arXiv, 2023, arXiv:2302.07867.
Pearce, H.; Tan, B.; Ahmad, B.; Karri, R.; Dolan-Gavitt, B. Examining zero-shot vulnerability repair with large language models. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 22–25 May 2023.
Wong, M. F.; Guo, S.; Hang, C. N.; Ho, S. W.; Tan, C. W. Natural language generation and understanding of big code for AI-assisted programming: A review. Entropy, 2023, 25, 888.
Hermann, K.; Peldszus, S.; Steghöfer, J. P.; Berger, T. An exploratory study on the engineering of security features. In Proceedings of the International Conference on Software Engineering (ICSE), Ottawa, ON, Canada, 27 April–3 May 2025.
Spiess, C.; Gros, D.; Pai, K. S.; Pradel, M.; Rabin, M. R. I.; Alipour, A.; Jha, S.; Devanbu, P.; Ahmed, T. Calibration and correctness of language models for code. In Proceedings of the International Conference on Software Engineering (ICSE), Lisbon, Portugal, 14–20 April 2024.
Zhang, T.; Yu, Y.; Mao, X.; Wang, S.; Yang, K.; Lu, Y.; Zhang, Z.; Zhao, Y. Instruct or interact? Exploring and eliciting LLMs’ capability in code snippet adaptation through prompt engineering. In Proceedings of the International Conference on Software Engineering (ICSE), Lisbon, Portugal, 14–20 April 2024.
Rajapaksha, S.; Senanayake, J.; Kalutarage, H.; Al-Kadri, M. O. Enhancing security assurance in software development: AI-based vulnerable code detection with static analysis. In European Symposium on Research in Computer Security, September 2023. Springer Nature Switzerland.
Behfar, S. K. Development strategy and management of AI-based vulnerability detection applications in an enterprise software environment. ECIS 2023 Research-in-Progress Papers.
Ricol, J. AI for secure software development: Identifying and fixing vulnerabilities with machine learning. 2022.
Gulraiz, A. Semantic analysis for deduplication of security findings in DevOps security tool reports. (date unspecified).
Samtani, S.; Abate, M.; Benjamin, V.; Li, W. Cybersecurity as an industry: A cyber threat intelligence perspective. In The Palgrave Handbook of International Cybercrime and Cyberdeviance, 2019, Palgrave Macmillan, Cham.
Sun, N.; Ding, M.; Jiang, J.; Xu, W.; Mo, X.; Tai, Y.; Zhang, J. Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives. IEEE Communications Surveys and Tutorials, 25(3), 1748–1774, 2023.
Zhou, Y.; Tang, Y.; Yi, M.; Xi, C.; Lu, H. CTI view: APT threat intelligence analysis system. Security and Communication Networks, 2022(1), 9875199.
Areo, G. Automating compliance in healthcare IT: Essential tools and techniques. 2021.
Amaral, O.; Abualhaija, S.; Torre, D.; Sabetzadeh, M.; Briand, L. C. AI-enabled automation for completeness checking of privacy policies. IEEE Transactions on Software Engineering, 48(11), 4647–4674, 2021.
Tang, F. I. P. Making AI GDPR compliant. 2019.
Security and privacy testing automation for LLM-enhanced applications in mobile devices. International Journal of Networks and Security, 5(02), 30–41, 2025.
Article Statistics
Downloads
Copyright License
Copyright (c) 2025 Arjun Mehta

This work is licensed under a Creative Commons Attribution 4.0 International License.