Cannavale, AlfonsoAlfonsoCannavaleIannone, EmanueleEmanueleIannoneDi Lillo, GianlucaGianlucaDi LilloPalomba, FabioFabioPalombaDe Lucia, AndreaAndreaDe Lucia2025-10-152025-10-15202551st Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2025https://hdl.handle.net/11420/58017Just-in-Time (JIT) vulnerability prediction is critical for proactively securing software, yet its effectiveness heavily relies on the quality of the ground truth used for training models. This ground truth is commonly established using variants of the SZZ algorithm to identify vulnerability-contributing commits (VCCs). However, the impact of choosing a specific SZZ variant on model performance remains largely unexplored. In this study, we systematically investigate the effect of eight SZZ variants on JIT vulnerability prediction across seven open-source Java projects. Our findings reveal that the choice of the SZZ variant is a non-trivial factor. Models trained with datasets labeled by variants like B-SZZ, V-SZZ, and VCC-SZZ achieve strong and stable predictive performance, with median MCC scores often exceeding 0.50. In contrast, variants such as L-SZZ and R-SZZ produce models that perform no better than random chance, with median MCC scores close to 0.0. This performance gap demonstrates that an inappropriate SZZ variant can invalidate prediction models, underscoring the necessity of a principled approach to defining ground truth.enComputer Science, Information and General Works::005: Computer Programming, Programs, Data and Security::005.8: Computer SecurityThe ground truth effect: investigating SZZ variants in Just-in-Time vulnerability predictionConference Paper10.1007/978-3-032-04207-1_21Conference Paper