Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?

被引:13
|
作者
Hu, Yutao [1 ,2 ]
Wang, Suyuan [1 ,2 ]
Li, Wenke [1 ]
Peng, Junru [3 ]
Wu, Yueming [4 ]
Zou, Deqing [1 ,2 ]
Jin, Hai [2 ,5 ]
机构
[1] Huazhong Univ Sci & Technol, Hubei Engn Res Ctr Big Data Secur, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Serv Comp Technol & Syst Lab, Natl Engn Res Ctr Big Data Technol & Syst, Wuhan 430074, Peoples R China
[3] Wuhan Univ, Wuhan, Peoples R China
[4] Nanyang Technol Univ, Singapore, Singapore
[5] HUST, Sch Comp Sci & Technol, Cluster & Grid Comp Lab, Wuhan 430074, Hubei, Peoples R China
基金
美国国家科学基金会;
关键词
Vulnerability Detection; Interpretation; GNN Interpreters;
D O I
10.1145/3597926.3598145
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Traditional vulnerability detection methods have limitations due to their need for extensive manual labor. Using automated means for vulnerability detection has attracted research interest, especially deep learning, which has achieved remarkable results. Since graphs can better convey the structural feature of code than text, graph neural network (GNN) based vulnerability detection is significantly better than text-based approaches. Therefore, GNN-based vulnerability detection approaches are becoming popular. However, GNN models are close to black boxes for security analysts, so the models cannot provide clear evidence to explain why a code sample is detected as vulnerable or secure. At this stage, many GNN interpreters have been proposed. However, the explanations provided by these interpretations for vulnerability detection models are highly inconsistent and unconvincing to security experts. To address the above issues, we propose principled guidelines to assess the quality of the interpretation approaches for GNN-based vulnerability detectors based on concerns in vulnerability detection, namely, stability, robustness, and effectiveness. We conduct extensive experiments to evaluate the interpretation performance of six famous interpreters (i.e., GNN-LRP, DeepLIFT, GradCAM, GNNExplainer, PGExplainer, and SubGraphX) on four vulnerability detectors (i.e., DeepWukong, Devign, IVDetect, and Reveal). The experimental results show that the target interpreters achieve poor performance in terms of effectiveness, stability, and robustness. For effectiveness, we find that the instance-independent methods outperform others due to their deep insight into the detection model. In terms of stability, the perturbation-based interpretation methods are more resilient to slight changes in model parameters as they are model-agnostic. For robustness, the instance-independent approaches provide more consistent interpretation results for similar vulnerabilities.
引用
收藏
页码:1407 / 1419
页数:13
相关论文
共 50 条
  • [1] GNN-based Ethereum Smart Contract Multi-Label Vulnerability Detection
    Cheong, Yoo-Young
    Choi, La Yeon
    Shin, Jihwan
    Kim, Taekyung
    Ahn, Jinhyun
    Im, Dong-Hyuk
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 57 - 61
  • [2] Efficient Network Representation for GNN-Based Intrusion Detection
    Friji, Hamdi
    Olivereau, Alexis
    Sarkiss, Mireille
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023, 2023, 13905 : 532 - 554
  • [3] Deep Learning Based Vulnerability Detection: Are We There Yet?
    Chakraborty, Saikat
    Krishna, Rahul
    Ding, Yangruibo
    Ray, Baishakhi
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (09) : 3280 - 3296
  • [4] GNN-based Advanced Feature Integration for ICS Anomaly Detection
    Shuaiyi, L. U.
    Wang, Kai
    Wei, Yuliang
    Liu, Hongri
    Fan, Qilin
    Wang, Bailing
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2023, 14 (06)
  • [5] Differentiable optimization layers enhance GNN-based mitosis detection
    Zhang, Haishan
    Nguyen, Dai Hai
    Tsuda, Koji
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [6] Decoupling Representation Learning and Classification for GNN-based Anomaly Detection
    Wang, Yanling
    Zhang, Jing
    Guo, Shasha
    Yin, Hongzhi
    Li, Cuiping
    Chen, Hong
    SIGIR '21 - PROCEEDINGS OF THE 44TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2021, : 1239 - 1248
  • [7] Differentiable optimization layers enhance GNN-based mitosis detection
    Haishan Zhang
    Dai Hai Nguyen
    Koji Tsuda
    Scientific Reports, 13
  • [8] GNN-based passenger request prediction
    Makhdomi, Aqsa Ashraf
    Gillani, Iqra Altaf
    TRANSPORTATION LETTERS-THE INTERNATIONAL JOURNAL OF TRANSPORTATION RESEARCH, 2024, 16 (10): : 1237 - 1251
  • [9] MS2-GNN: Exploring GNN-Based Multimodal Fusion Network for Depression Detection
    Chen, Tao
    Hong, Richang
    Guo, Yanrong
    Hao, Shijie
    Hu, Bin
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (12) : 7749 - 7759
  • [10] GNN-Based Network Traffic Analysis for the Detection of Sequential Attacks in IoT
    Altaf, Tanzeela
    Wang, Xu
    Ni, Wei
    Yu, Guangsheng
    Liu, Ren Ping
    Braun, Robin
    ELECTRONICS, 2024, 13 (12)