Result: HGAN4VD: Leveraging Heterogeneous Graph Attention Networks for enhanced Vulnerability Detection.

Title:
HGAN4VD: Leveraging Heterogeneous Graph Attention Networks for enhanced Vulnerability Detection.
Authors:
Zhang, Yucheng1 (AUTHOR) yc.zhang@stmail.ntu.edu.cn, Ju, Xiaolin1 (AUTHOR) ju.xl@ntu.edu.cn, Chen, Xiang1,2 (AUTHOR) xchencs@ntu.edu.cn, Amin, Misbahul1 (AUTHOR) misbahul.amin.ai@gmail.com, Ren, Zilong1 (AUTHOR) Zilongren23@gmail.com
Source:
Computers & Security. Oct2025, Vol. 157, pN.PAG-N.PAG. 1p.
Database:
Business Source Premier

Further Information

Detecting vulnerabilities is crucial for mitigating inherent risks in software systems. In recent years, there has been a significant increase in developing effective vulnerability detection approaches, many of which leverage deep learning technologies. These methods provide notable advantages, including automated feature extraction and the ability to train models autonomously, thereby improving the efficiency and accuracy of the detection process. However, existing methods encounter two significant limitations. Firstly, code analysis lacks granularity and does not fully leverage semantic and syntactic information within code structures, resulting in suboptimal performance. Secondly, approaches based on Graph Neural Networks (GNNs) inherently struggle to capture long-distance relationships between nodes in code structures. In this paper, we propose HGAN4VD, a novel vulnerability detection method that utilizes heterogeneous intermediate source code representations to address these limitations. HGAN4VD comprises two components: a heterogeneous code representation graph, which is constructed by creating diverse code representations and simplifying the graph to reduce node distances, and a Heterogeneous Graph Attention Network, which incorporates two attention layers to calculate node-level and semantic-level attention. Experiments on three widely used datasets demonstrate that HGAN4VD outperforms state-of-the-art methods by 1.5% to 7.7% in accuracy and 3.8% to 12.2% in F1 score metrics, affirming its effectiveness in learning global information for code graphs used in vulnerability detection. Furthermore, we demonstrate the generalization capability of our method on Java and Python datasets, suggesting its potential for broader applicability. [ABSTRACT FROM AUTHOR]

Copyright of Computers & Security is the property of Pergamon Press - An Imprint of Elsevier Science and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)