{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T03:42:45Z","timestamp":1777866165773,"version":"3.51.4"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T00:00:00Z","timestamp":1775606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T00:00:00Z","timestamp":1775606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004270","name":"Royal Institute of Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004270","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1007\/s10664-026-10835-1","type":"journal-article","created":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T12:17:32Z","timestamp":1775650652000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Byam: Fixing Breaking Dependency Updates with Large Language Models"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0028-5010","authenticated-orcid":false,"given":"Frank","family":"Reyes","sequence":"first","affiliation":[]},{"given":"May","family":"Mahmoud","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Bono","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Nadi","sequence":"additional","affiliation":[]},{"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,8]]},"reference":[{"key":"10835_CR1","doi-asserted-by":"crossref","unstructured":"Almeida A, Xavier L, Valente MT (2024) Automatic Library Migration Using Large Language Models: First Results. In: International symposium on empirical software engineering and measurement","DOI":"10.1145\/3674805.3690746"},{"key":"10835_CR2","unstructured":"Bono F, Reyes F, Sharma A, Baudry B, Monperrus M (2024) Java-Class-Hijack: Software Supply Chain Attack for Java based on Maven Dependency Resolution and Java Classloading"},{"key":"10835_CR3","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.1007\/s10664-019-09756-z","volume":"25","author":"A Brito","year":"2020","unstructured":"Brito A, Valente MT, Xavier L, Hora A (2020) You broke my code: understanding the motivations for breaking changes in APIs. Empir Softw Eng 25:1458\u20131492","journal-title":"Empir Softw Eng"},{"key":"10835_CR4","doi-asserted-by":"crossref","unstructured":"Brito A, Xavier L, Hora A, Valente MT (2018a) APIDiff: Detecting API breaking changes. In 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), pages 507\u2013511. IEEE","DOI":"10.1109\/SANER.2018.8330249"},{"key":"10835_CR5","doi-asserted-by":"crossref","unstructured":"Brito A, Xavier L, Hora A, Valente MT (2018b) Why and how Java developers break APIs. In 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), pages 255\u2013265. IEEE","DOI":"10.1109\/SANER.2018.8330214"},{"issue":"3","key":"10835_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3641289","volume":"15","author":"Y Chang","year":"2024","unstructured":"Chang Y, Wang X, Wang J, Wu Y, Yang L, Zhu K, Chen H, Yi X, Wang C, Wang Y et al (2024) A survey on evaluation of large language models. ACM Transactions on Intelligent Systems and Technology 15(3):1\u201345","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"10835_CR7","doi-asserted-by":"crossref","unstructured":"Dagenais B, Robillard MP (2009) SemDiff: Analysis and recommendation support for API evolution. In 2009 IEEE 31st international conference on software engineering, pages 599\u2013602. IEEE","DOI":"10.1109\/ICSE.2009.5070565"},{"key":"10835_CR8","doi-asserted-by":"crossref","unstructured":"Dietrich J, Pearce D, Stringer J, Tahir A, Blincoe K (2019) Dependency Versioning in the Wild. In 2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR), pages 349\u2013359","DOI":"10.1109\/MSR.2019.00061"},{"key":"10835_CR9","first-page":"2","volume-title":"Automatically Fixing Dependency Breaking Changes","author":"L Frunkte","year":"2025","unstructured":"Frunkte L, Krinke J (2025) Automatically Fixing Dependency Breaking Changes. In Proc, ACM Software Engineer, p 2"},{"key":"10835_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111097","volume":"183","author":"J Hejderup","year":"2021","unstructured":"Hejderup J, Gousios G (2021) Can We Trust Tests To Automate Dependency Updates? A Case Study of Java Projects. J Syst Softw 183:111097","journal-title":"J Syst Softw"},{"key":"10835_CR11","unstructured":"Jain N, Han K, Gu A, Li W-D, Yan F, Zhang T, Wang S, Solar-Lezama A, Sen K, Stoica I (2024) LiveCodeBench: Holistic and Contamination Free Evaluation of Large Language Models for Code"},{"issue":"8","key":"10835_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3470133","volume":"54","author":"M Lamothe","year":"2021","unstructured":"Lamothe M, Gu\u00e9h\u00e9neuc Y-G, Shang W (2021) A systematic review of API evolution literature. ACM Computing Surveys (CSUR) 54(8):1\u201336","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10835_CR13","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/TSE.2020.2988396","volume":"48","author":"M Lamothe","year":"2022","unstructured":"Lamothe M, Shang W, Chen T-HP (2022) A3: Assisting Android API Migrations Using Code Examples. IEEE Trans Software Eng 48:417\u2013431","journal-title":"IEEE Trans Software Eng"},{"key":"10835_CR14","doi-asserted-by":"crossref","unstructured":"Larios Vargas E, Aniche M, Treude C, Bruntink M, Gousios G (2020) Selecting third-party libraries: The practitioners\u2019 perspective. In: Proceedings of the 28th ACM joint meeting on european software engineering conference and symposium on the foundations of software engineering, pages 245\u2013256","DOI":"10.1145\/3368089.3409711"},{"issue":"12","key":"10835_CR15","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/3318162","volume":"62","author":"C Le Goues","year":"2019","unstructured":"Le Goues C, Pradel M, Roychoudhury A (2019) Automated program repair. Commun ACM 62(12):56\u201365","journal-title":"Commun ACM"},{"key":"10835_CR16","doi-asserted-by":"crossref","unstructured":"Liu J, Yan J, Xie Y, Yan J, Zhang J (2024) Fix the Tests: Augmenting LLMs to Repair Test Cases with Static Collector and Neural Reranker. In: 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE), pages 367\u2013378","DOI":"10.1109\/ISSRE62328.2024.00043"},{"key":"10835_CR17","unstructured":"Maven (2022) japicmp-base"},{"key":"10835_CR18","doi-asserted-by":"crossref","unstructured":"Monperrus M (2018) Automatic Software Repair: A Bibliography. ACM Comput Surv 51(1)","DOI":"10.1145\/3105906"},{"key":"10835_CR19","doi-asserted-by":"crossref","unstructured":"Mujahid S, Abdalkareem R, Shihab E, McIntosh S (2020) Using others\u2019 tests to identify breaking updates. In: Proceedings of the 17th international conference on mining software repositories, pages 466\u2013476","DOI":"10.1145\/3379597.3387476"},{"key":"10835_CR20","doi-asserted-by":"crossref","unstructured":"Ni A, Ramos D, Yang AZH, Lynce I, Manquinho VM, Martins R, Goues CL (2021) SOAR: A Synthesis Approach for Data Science API Refactoring. 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pages 112\u2013124","DOI":"10.1109\/ICSE43902.2021.00023"},{"key":"10835_CR21","doi-asserted-by":"crossref","unstructured":"Nikolov S, Codecasa D, Sjovall A, Tabachnyk M, Chandra S, Taneja S, Ziftci C (2025) How is Google using AI for internal code migrations? ArXiv arXiv:2501.06972","DOI":"10.1109\/ICSE-SEIP66354.2025.00048"},{"issue":"3","key":"10835_CR22","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s10664-021-10052-y","volume":"27","author":"L Ochoa","year":"2022","unstructured":"Ochoa L, Degueule T, Falleri J-R, Vinju J (2022) Breaking bad? semantic versioning and impact of breaking changes in maven central: An external and differentiated replication study. Empir Softw Eng 27(3):61","journal-title":"Empir Softw Eng"},{"key":"10835_CR23","doi-asserted-by":"crossref","unstructured":"Reyes F, Baudry B, Monperrus M (2024a) Breaking-Good: Explaining Breaking Dependency Updates with Build Analysis. In: Proceedings of IEEE international conference on source code analysis and manipulation","DOI":"10.1109\/SCAM63643.2024.00014"},{"key":"10835_CR24","doi-asserted-by":"crossref","unstructured":"Reyes F, Gamage Y, Skoglund G, Baudry B, Monperrus M (2024b) BUMP: A Benchmark of Reproducible Breaking Dependency Updates. In: 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pages 159\u2013170","DOI":"10.1109\/SANER60148.2024.00024"},{"key":"10835_CR25","doi-asserted-by":"crossref","unstructured":"Salza P, Palomba F, Di Nucci D, D\u2019Uva C, De Lucia A, Ferrucci F (2018).Do developers update third-party libraries in mobile apps? In Proceedings of the 26th conference on program comprehension, pages 255\u2013265","DOI":"10.1145\/3196321.3196341"},{"key":"10835_CR26","doi-asserted-by":"crossref","unstructured":"Silva A, Monperrus M (2024) RepairBench: Leaderboard of Frontier Models for Program Repair. Technical Report. arXiv:2409.18952","DOI":"10.1109\/LLM4Code66737.2025.00006"},{"key":"10835_CR27","unstructured":"Vaswani A (2017) Attention is all you need. Adv Neural Inf Proc Syst"},{"issue":"4","key":"10835_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3576037","volume":"32","author":"D Venturini","year":"2023","unstructured":"Venturini D, Cogo FR, Polato I, Gerosa MA, Wiese IS (2023) I depended on you and you broke me: An empirical study of manifesting breaking changes in client packages. ACM Transactions on Software Engineering and Methodology 32(4):1\u201326","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10835_CR29","unstructured":"Wei J, Wang X, Schuurmans D, Bosma M, Ichter B, Xia F, Chi E, Le Q, Zhou D (2023) Chain-of-Thought Prompting Elicits Reasoning in Large Language Models"},{"key":"10835_CR30","doi-asserted-by":"crossref","unstructured":"Xavier L, Hora A, Valente MT (2017) Why do we break APIs? first answers from developers. In: 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), pages 392\u2013396. IEEE","DOI":"10.1109\/SANER.2017.7884640"},{"issue":"12","key":"10835_CR31","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1109\/TSE.2007.70747","volume":"33","author":"Z Xing","year":"2007","unstructured":"Xing Z, Stroulia E (2007) API-evolution support with Diff-CatchUp. IEEE Trans Software Eng 33(12):818\u2013836","journal-title":"IEEE Trans Software Eng"},{"key":"10835_CR32","doi-asserted-by":"crossref","unstructured":"Xu S, Dong Z, Meng N (2019) Meditor: Inference and Application of API Migration Edits. In: 2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC), pages 335\u2013346","DOI":"10.1109\/ICPC.2019.00052"},{"key":"10835_CR33","doi-asserted-by":"crossref","unstructured":"Zhang L, Liu C, Xu Z, Chen S, Fan L, Chen B, Liu Y (2022) Has my release disobeyed semantic versioning? static detection based on semantic differencing. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, pages 1\u201312","DOI":"10.1145\/3551349.3556956"},{"key":"10835_CR34","unstructured":"Zhang S, Xiao G, Wang J, Lei H, Liu Y, Zheng Z (2024) PCART: Automated Repair of Python API Parameter Compatibility Issues. arXiv:2406.03839"},{"key":"10835_CR35","doi-asserted-by":"crossref","unstructured":"Zhu C, Saha RK, Prasad MR, Khurshid S (2021) Restoring the Executability of Jupyter Notebooks by Automatic Upgrade of Deprecated APIs. 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pages 240\u2013252","DOI":"10.1109\/ASE51524.2021.9678889"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-026-10835-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-026-10835-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-026-10835-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T08:09:31Z","timestamp":1777536571000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-026-10835-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,8]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,7]]}},"alternative-id":["10835"],"URL":"https:\/\/doi.org\/10.1007\/s10664-026-10835-1","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,8]]},"assertion":[{"value":"29 January 2026","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interest"}},{"value":"Generative AI was not used for the generation of any part of the content in this paper or for data analysis. Grammarly, a tool that uses AI, was used for spell checking, grammar correction, and improving writing clarity.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Generative AI"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Clinical Trial Number"}}],"article-number":"113"}}