Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?

被引:13
|
作者
Hu, Yutao [1 ,2 ]
Wang, Suyuan [1 ,2 ]
Li, Wenke [1 ]
Peng, Junru [3 ]
Wu, Yueming [4 ]
Zou, Deqing [1 ,2 ]
Jin, Hai [2 ,5 ]
机构
[1] Huazhong Univ Sci & Technol, Hubei Engn Res Ctr Big Data Secur, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Serv Comp Technol & Syst Lab, Natl Engn Res Ctr Big Data Technol & Syst, Wuhan 430074, Peoples R China
[3] Wuhan Univ, Wuhan, Peoples R China
[4] Nanyang Technol Univ, Singapore, Singapore
[5] HUST, Sch Comp Sci & Technol, Cluster & Grid Comp Lab, Wuhan 430074, Hubei, Peoples R China
基金
美国国家科学基金会;
关键词
Vulnerability Detection; Interpretation; GNN Interpreters;
D O I
10.1145/3597926.3598145
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Traditional vulnerability detection methods have limitations due to their need for extensive manual labor. Using automated means for vulnerability detection has attracted research interest, especially deep learning, which has achieved remarkable results. Since graphs can better convey the structural feature of code than text, graph neural network (GNN) based vulnerability detection is significantly better than text-based approaches. Therefore, GNN-based vulnerability detection approaches are becoming popular. However, GNN models are close to black boxes for security analysts, so the models cannot provide clear evidence to explain why a code sample is detected as vulnerable or secure. At this stage, many GNN interpreters have been proposed. However, the explanations provided by these interpretations for vulnerability detection models are highly inconsistent and unconvincing to security experts. To address the above issues, we propose principled guidelines to assess the quality of the interpretation approaches for GNN-based vulnerability detectors based on concerns in vulnerability detection, namely, stability, robustness, and effectiveness. We conduct extensive experiments to evaluate the interpretation performance of six famous interpreters (i.e., GNN-LRP, DeepLIFT, GradCAM, GNNExplainer, PGExplainer, and SubGraphX) on four vulnerability detectors (i.e., DeepWukong, Devign, IVDetect, and Reveal). The experimental results show that the target interpreters achieve poor performance in terms of effectiveness, stability, and robustness. For effectiveness, we find that the instance-independent methods outperform others due to their deep insight into the detection model. In terms of stability, the perturbation-based interpretation methods are more resilient to slight changes in model parameters as they are model-agnostic. For robustness, the instance-independent approaches provide more consistent interpretation results for similar vulnerabilities.
引用
收藏
页码:1407 / 1419
页数:13
相关论文
共 50 条
  • [21] GNN-Based Hierarchical Annotation for Analog Circuits
    Kunal, Kishor
    Dhar, Tonmoy
    Madhusudan, Meghna
    Poojary, Jitesh
    Sharma, Arvind K.
    Xu, Wenbin
    Burns, Steven M.
    Hu, Jiang
    Harjani, Ramesh
    Sapatnekar, Sachin S.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (09) : 2801 - 2814
  • [22] Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
    Nazzal, Mahmoud
    Khalil, Issa
    Khreishah, Abdallah
    Phan, NhatHai
    Ma, Yao
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 1236 - 1254
  • [23] A GNN-based predictor for quantum architecture search
    Zhimin He
    Xuefen Zhang
    Chuangtao Chen
    Zhiming Huang
    Yan Zhou
    Haozhen Situ
    Quantum Information Processing, 22
  • [24] Enhancing social and collaborative learning using a stacked GNN-based community detection
    Ben Yahia, Nesrine
    SOCIAL NETWORK ANALYSIS AND MINING, 2024, 14 (01)
  • [25] SCN_GNN: A GNN-based fraud detection algorithm combining strong node and graph topology information
    Chen, Jing
    Chen, Quanzhen
    Jiang, Feng
    Guo, Xuyao
    Sha, Kaiyue
    Wang, Yuxuan
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 237
  • [26] SCN_GNN: A GNN-based fraud detection algorithm combining strong node and graph topology information
    Chen, Jing
    Chen, Quanzhen
    Jiang, Feng
    Guo, Xuyao
    Sha, Kaiyue
    Wang, Yuxuan
    Expert Systems with Applications, 2024, 237
  • [27] Scalable Verification of GNN-Based Job Schedulers
    Wu, Haoze
    Barrett, Clark
    Sharif, Mahmood
    Narodytska, Nina
    Singh, Gagandeep
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2022, 6 (OOPSLA):
  • [28] SpecKriging: GNN-Based Secure Cooperative Spectrum Sensing
    Zhang, Yan
    Li, Ang
    Li, Jiawei
    Han, Dianqi
    Li, Tao
    Zhang, Rui
    Zhang, Yanchao
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (11) : 9936 - 9946
  • [29] A GNN-based few-shot learning model on the credit card fraud detection
    Jing, Rongrong
    Tian, Hu
    Zhou, Gang
    Zhang, Xingwei
    Zheng, Xiaolong
    Zeng, Daniel Dajun
    Proceedings 2021 IEEE 1st International Conference on Digital Twins and Parallel Intelligence, DTPI 2021, 2021, : 320 - 323
  • [30] Neural Architecture Search for GNN-Based Graph Classification
    Wei, Lanning
    Zhao, Huan
    He, Zhiqiang
    Yao, Quanming
    ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2024, 42 (01)