Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?

被引:13
|
作者
Hu, Yutao [1 ,2 ]
Wang, Suyuan [1 ,2 ]
Li, Wenke [1 ]
Peng, Junru [3 ]
Wu, Yueming [4 ]
Zou, Deqing [1 ,2 ]
Jin, Hai [2 ,5 ]
机构
[1] Huazhong Univ Sci & Technol, Hubei Engn Res Ctr Big Data Secur, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Serv Comp Technol & Syst Lab, Natl Engn Res Ctr Big Data Technol & Syst, Wuhan 430074, Peoples R China
[3] Wuhan Univ, Wuhan, Peoples R China
[4] Nanyang Technol Univ, Singapore, Singapore
[5] HUST, Sch Comp Sci & Technol, Cluster & Grid Comp Lab, Wuhan 430074, Hubei, Peoples R China
基金
美国国家科学基金会;
关键词
Vulnerability Detection; Interpretation; GNN Interpreters;
D O I
10.1145/3597926.3598145
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Traditional vulnerability detection methods have limitations due to their need for extensive manual labor. Using automated means for vulnerability detection has attracted research interest, especially deep learning, which has achieved remarkable results. Since graphs can better convey the structural feature of code than text, graph neural network (GNN) based vulnerability detection is significantly better than text-based approaches. Therefore, GNN-based vulnerability detection approaches are becoming popular. However, GNN models are close to black boxes for security analysts, so the models cannot provide clear evidence to explain why a code sample is detected as vulnerable or secure. At this stage, many GNN interpreters have been proposed. However, the explanations provided by these interpretations for vulnerability detection models are highly inconsistent and unconvincing to security experts. To address the above issues, we propose principled guidelines to assess the quality of the interpretation approaches for GNN-based vulnerability detectors based on concerns in vulnerability detection, namely, stability, robustness, and effectiveness. We conduct extensive experiments to evaluate the interpretation performance of six famous interpreters (i.e., GNN-LRP, DeepLIFT, GradCAM, GNNExplainer, PGExplainer, and SubGraphX) on four vulnerability detectors (i.e., DeepWukong, Devign, IVDetect, and Reveal). The experimental results show that the target interpreters achieve poor performance in terms of effectiveness, stability, and robustness. For effectiveness, we find that the instance-independent methods outperform others due to their deep insight into the detection model. In terms of stability, the perturbation-based interpretation methods are more resilient to slight changes in model parameters as they are model-agnostic. For robustness, the instance-independent approaches provide more consistent interpretation results for similar vulnerabilities.
引用
收藏
页码:1407 / 1419
页数:13
相关论文
共 50 条
  • [31] Adversarial Attack on GNN-based SAR Image Classifier
    Ye, Tian
    Kannan, Rajgopal
    Prasanna, Viktor
    Busart, Carl
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS V, 2023, 12538
  • [32] A GNN-based proactive caching strategy in NDN networks
    Jiacheng Hou
    Haoye Lu
    Amiya Nayak
    Peer-to-Peer Networking and Applications, 2023, 16 : 997 - 1009
  • [33] GDDR: GNN-based Data-Driven Routing
    Hope, Oliver
    Yoneki, Eiko
    2021 IEEE 41ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2021), 2021, : 517 - 527
  • [34] GNN-based surrogate modeling for collection systems costs
    de Alencar, M. Souza
    Gocmen, T.
    Cutululis, N. A.
    SCIENCE OF MAKING TORQUE FROM WIND, TORQUE 2024, 2024, 2767
  • [35] GNN-based Concentration Prediction for Random Microfluidic Mixers
    Ji, Weiqing
    Guo, Xingzhuo
    Pan, Shouan
    Ho, Tsung-Yi
    Schlichtmann, Ulf
    Yao, Hailong
    PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, 2022, : 763 - 768
  • [36] A GNN-based proactive caching strategy in NDN networks
    Hou, Jiacheng
    Lu, Haoye
    Nayak, Amiya
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (02) : 997 - 1009
  • [37] A GNN-Based Architecture for Group Detection from Spatio-Temporal Trajectory Data
    Nasri, Maedeh
    Fang, Zhizhou
    Baratchi, Mitra
    Englebienne, Gwenn
    Wang, Shenghui
    Koutamanis, Alexander
    Rieffe, Carolien
    ADVANCES IN INTELLIGENT DATA ANALYSIS XXI, IDA 2023, 2023, 13876 : 327 - 339
  • [38] GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding
    Gu, Jintao
    Zhu, Hongliang
    Han, Zewei
    Li, Xiangyu
    Zhao, Jianjin
    COMPUTERS & SECURITY, 2024, 140
  • [39] Discerning Limitations of GNN-based Attacks on Logic Locking
    Darjani, Armin
    Kavand, Nima
    Rai, Shubham
    Kumar, Akash
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [40] Targeted Shilling Attacks on GNN-based Recommender Systems
    Guo, Sihan
    Bai, Ting
    Deng, Weihong
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 649 - 658