Enhanced Vulnerability Localization: Harmonizing Task-Enhanced Tuning and General LLM Prompting
This program is tentative and subject to change.
Large Language Models (LLMs) have shown significant potential for vulnerability localization in software security. However, current LLM-based approaches face a critical dilemma: direct application of general-purpose LLMs lacks crucial domain-specific expertise, while fine-tuning suffers from limited robustness when faced with unfamiliar data. These problems result in subpar performance in vulnerability localization and weak generalization capabilities. To address these limitations, we introduce ENVUL, a novel domain adaptation framework for vulnerability localization. ENVUL improves vulnerability localization by synergizing enhanced task-specific tuning with prompt engineering of general-purpose LLMs. ENVUL improves vulnerability localization by synergizing enhanced task-specific tuning with prompt engineering of general-purpose LLMs. ENVUL incorporates three key innovations for addressing two problems: (1) how to optimize fine-tuning for localization task, and (2) when to wisely choose tuning and prompting. To solve the first problem, we introduce: (a). a context Consolidator that captures rich statement-level code semantic, improving the model’s understanding of code context; (b). a semantic Indicator employing attention rectification to highlight patterns indicative of vulnerabilities, focusing the model on critical security signals. To solve the second problem, we introduce a dynamic routing mechanism based on joint-representation similarity analysis that strategically delegates tasks between the fine-tuned model and the general LLM. It ensures ENVUL’s robust performance across diverse real-world vulnerability types. Real-world evaluations demonstrate ENVUL’s robust expertise in outperforming state-of-the-art vulnerability localization baselines, achieving absolute improvements of 22.7%-30.3% in top-1 accuracy. Notably, ENVUL exhibits exceptional generalization, achieving 43.6%-50% higher accuracy on unfamiliar vulnerability types.
This program is tentative and subject to change.
Fri 12 SepDisplayed time zone: Auckland, Wellington change
15:30 - 16:30 | |||
15:30 15m | LLM-SZZ: Novel Vulnerability Affected Range Identification Driven by Large Language Model and CVE Description Research Papers Track Siqi Fan Lanzhou University, Xin Liu Lanzhou University, Yingli Zhang Lanzhou University, Yuan Tan Lanzhou University, Luxing Yin Lanzhou University, Zhaorun Chen University of Chicago, Song Li The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Lei Qiao Lanzhou University, Rui Zhou Lanzhou University | ||
15:45 15m | Enhanced Vulnerability Localization: Harmonizing Task-Enhanced Tuning and General LLM Prompting Research Papers Track Wentong Tian Beihang University, Yuanzhang Lin Beihang University, Xiang Gao Beihang University, Hailong Sun Beihang University | ||
16:00 15m | Toward Realistic Evaluations of Just-In-Time Vulnerability Prediction Research Papers Track Duong Nguyen Hanoi University of Science and Technology, Le-Cong Thanh The University of Melbourne, Triet Le The University of Adelaide, Muhammad Ali Babar School of Computer Science, The University of Adelaide, Quyet Thang Huynh Hanoi University of Science and Technology |