ICSE 2024
Fri 12 - Sun 21 April 2024 Lisbon, Portugal
Thu 18 Apr 2024 11:30 - 11:45 at Sophia de Mello Breyner Andresen - AI & Security 2 Chair(s): Gabriele Bavota

Recently, Graph Neural Network (GNN)-based vulnerability detection systems have achieved remarkable success. However, the lack of explainability poses a critical challenge to deploy black-box models in security-related domains. For this reason, several approaches have been proposed to explain the decision logic of the detection model by providing a set of crucial statements positively contributing to its predictions. Unfortunately, due to the weakly-robust detection models and suboptimal explanation strategy, they have the danger of revealing spurious correlations and failure to make a trade-off between conciseness and effectiveness.

In this paper, we propose Coca, a general framework aiming to 1) enhance the robustness of existing GNN-based vulnerability detection models to avoid spurious explanations; and 2) provide both concise and effective explanations to reason about the detected vulnerabilities. Coca consists of two core parts referred to as Trainer and Explainer. The former aims to train a detection model which is robust to random perturbation based on combinatorial contrastive learning, while the latter builds an explainer to derive crucial statements that are most decisive to the detected vulnerability via dual-view causal inference. We apply Coca over three typical GNN-based vulnerability detectors. Experimental results show that Coca can effectively mitigate the spurious explanation issue, and provide more useful high-quality explanations.

Slides (ICSE24-Slides.pdf)2.79MiB

Thu 18 Apr

Displayed time zone: Lisbon change

11:00 - 12:30
AI & Security 2Research Track / New Ideas and Emerging Results at Sophia de Mello Breyner Andresen
Chair(s): Gabriele Bavota Software Institute @ Università della Svizzera Italiana
11:00
15m
Talk
Towards Causal Deep Learning for Vulnerability Detection
Research Track
Md Mahbubur Rahman Iowa State University, Ira Ceka Columbia University, Chengzhi Mao Columbia University, Saikat Chakraborty Microsoft Research, Baishakhi Ray AWS AI Labs, Wei Le Iowa State University
11:15
15m
Talk
MetaLog: Generalizable Cross-System Anomaly Detection from Logs with Meta-Learning
Research Track
Chenyangguang Zhang Tsinghua University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Guopeng Shen Linkedsee Technology (China) Limited, Pinyan Zhu Linkedsee Technology (China) Limited, Ying Li School of Software and Microelectronics, Peking University, Beijing, China
11:30
15m
Talk
Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems
Research Track
Sicong Cao Yangzhou University, Xiaobing Sun Yangzhou University, Xiaoxue Wu Yangzhou University, David Lo Singapore Management University, Lili Bo Yangzhou University, Bin Li Yangzhou University, Wei Liu Nanjing University
Media Attached File Attached
11:45
15m
Talk
Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection
Research Track
Yizhou Chen Peking University, Zeyu Sun Institute of Software, Chinese Academy of Sciences, Zhihao Gong Peking University, Dan Hao Peking University
12:00
15m
Talk
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
Research Track
Zhen Li Huazhong University of Science and Technology, Ning Wang Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Yating Li Huazhong University of Science and Technology, Ruqian Zhang Huazhong University of Science and Technology, Shouhuai Xu University of Colorado Colorado Springs, Chao Zhang Tsinghua University, Hai Jin Huazhong University of Science and Technology
Pre-print
12:15
7m
Talk
Large Language Model for Vulnerability Detection: Emerging Results and Future Directions
New Ideas and Emerging Results
Xin Zhou Singapore Management University, Singapore, Ting Zhang Singapore Management University, David Lo Singapore Management University
12:22
7m
Talk
Re(gEx|DoS)Eval: Evaluating Generated Regular Expressions and their Proneness to DoS Attacks
New Ideas and Emerging Results
Mohammed Latif Siddiq University of Notre Dame, Jiahao Zhang , Lindsay Roney University of Notre Dame, Joanna C. S. Santos University of Notre Dame
DOI Pre-print Media Attached