Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?

被引:13
|
作者
Hu, Yutao [1 ,2 ]
Wang, Suyuan [1 ,2 ]
Li, Wenke [1 ]
Peng, Junru [3 ]
Wu, Yueming [4 ]
Zou, Deqing [1 ,2 ]
Jin, Hai [2 ,5 ]
机构
[1] Huazhong Univ Sci & Technol, Hubei Engn Res Ctr Big Data Secur, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Serv Comp Technol & Syst Lab, Natl Engn Res Ctr Big Data Technol & Syst, Wuhan 430074, Peoples R China
[3] Wuhan Univ, Wuhan, Peoples R China
[4] Nanyang Technol Univ, Singapore, Singapore
[5] HUST, Sch Comp Sci & Technol, Cluster & Grid Comp Lab, Wuhan 430074, Hubei, Peoples R China
基金
美国国家科学基金会;
关键词
Vulnerability Detection; Interpretation; GNN Interpreters;
D O I
10.1145/3597926.3598145
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Traditional vulnerability detection methods have limitations due to their need for extensive manual labor. Using automated means for vulnerability detection has attracted research interest, especially deep learning, which has achieved remarkable results. Since graphs can better convey the structural feature of code than text, graph neural network (GNN) based vulnerability detection is significantly better than text-based approaches. Therefore, GNN-based vulnerability detection approaches are becoming popular. However, GNN models are close to black boxes for security analysts, so the models cannot provide clear evidence to explain why a code sample is detected as vulnerable or secure. At this stage, many GNN interpreters have been proposed. However, the explanations provided by these interpretations for vulnerability detection models are highly inconsistent and unconvincing to security experts. To address the above issues, we propose principled guidelines to assess the quality of the interpretation approaches for GNN-based vulnerability detectors based on concerns in vulnerability detection, namely, stability, robustness, and effectiveness. We conduct extensive experiments to evaluate the interpretation performance of six famous interpreters (i.e., GNN-LRP, DeepLIFT, GradCAM, GNNExplainer, PGExplainer, and SubGraphX) on four vulnerability detectors (i.e., DeepWukong, Devign, IVDetect, and Reveal). The experimental results show that the target interpreters achieve poor performance in terms of effectiveness, stability, and robustness. For effectiveness, we find that the instance-independent methods outperform others due to their deep insight into the detection model. In terms of stability, the perturbation-based interpretation methods are more resilient to slight changes in model parameters as they are model-agnostic. For robustness, the instance-independent approaches provide more consistent interpretation results for similar vulnerabilities.
引用
收藏
页码:1407 / 1419
页数:13
相关论文
共 50 条
  • [41] Label Attentive Distillation for GNN-Based Graph Classification
    Hong, Xiaobin
    Li, Wenzhong
    Wang, Chaoqun
    Lin, Mingkai
    Lu, Sanglu
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 8, 2024, : 8499 - 8507
  • [42] MeshGraphNetRP: Improving Generalization of GNN-based Cloth Simulation
    Libao, Emmanuel Ian
    Lee, Myeongjin
    Kim, Sumin
    Lee, Sung-Hee
    15TH ANNUAL ACM SIGGRAPH CONFERENCE ON MOTION, INTERACTION AND GAMES, MIG 2023, 2023,
  • [43] Thwarting GNN-Based Attacks Against Logic Locking
    Darjani, Armin
    Kavand, Nima
    Rai, Shubham
    Kumar, Akash
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7200 - 7215
  • [44] Just-in-time software vulnerability detection: Are we there yet?
    Lomio, Francesco
    Iannone, Emanuele
    De Lucia, Andrea
    Palomba, Fabio
    Lenarduzzi, Valentina
    JOURNAL OF SYSTEMS AND SOFTWARE, 2022, 188
  • [45] A comprehensive survey on GNN-based anomaly detection: taxonomy, methods, and the role of large language models
    Yuan, Ziqi
    Sun, Qingyun
    Zhou, Haoyi
    Shao, Minglai
    Fu, Xingcheng
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2025,
  • [46] Traffexplainer: A Framework Toward GNN-Based Interpretable Traffic Prediction
    Kong, Lingbai
    Yang, Hanchen
    Li, Wengen
    Zhang, Yichao
    Guan, Jihong
    Zhou, Shuigeng
    IEEE Transactions on Artificial Intelligence, 2025, 6 (03): : 559 - 573
  • [47] Two-stage GNN-based fraud detection with camouflage identification and enhanced semantics aggregation
    Zhang, Jun
    Lu, Jianguang
    Tang, Xianghong
    NEUROCOMPUTING, 2024, 570
  • [48] Cost-Sensitive GNN-Based Imbalanced Learning for Mobile Social Network Fraud Detection
    Hu, Xinxin
    Chen, Haotian
    Chen, Hongchang
    Liu, Shuxin
    Li, Xing
    Zhang, Shibo
    Wang, Yahui
    Xue, Xiangyang
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (02) : 2675 - 2690
  • [49] A GNN-based Recommender System to Assist the Specification of Metamodels and Models
    Di Rocco, Juri
    Di Sipio, Claudio
    Di Ruscio, Davide
    Nguyen, Phuong T.
    24TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS 2021), 2021, : 70 - 81
  • [50] GNN-based embedding for clustering scRNA-seq data
    Ciortan, Madalina
    Defrance, Matthieu
    BIOINFORMATICS, 2022, 38 (04) : 1037 - 1044