Graph-Based Profiling of Dependency Vulnerability Remediation

Fernando Vera Buschmann, Palina Pauliuchenka, Ethan Oh, Bai Chien Kao, Louis DiValentin, David A. Bader

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This research presents an enhanced Graph Attention Convolutional Neural Network (GAT) tailored for the analysis of open-source package vulnerability remediation. By meticulously examining control flow graphs and implementing node centrality metrics-specifically, degree, norm, and closeness centrality-our methodology identifies and evaluates changes resulting from vulnerability fixes in nodes, thereby predicting the ramifications of dependency upgrades on application workflows. Empirical testing on diverse datasets reveals that our model challenges established paradigms in software security, showcasing its efficacy in delivering comprehensive insights into code vulnerabilities and contributing to advancements in cybersecurity practices. This study delineates a strategic framework for the development of sustainable monitoring systems and the effective remediation of vulnerabilities in open-source software.

Original languageEnglish (US)
Title of host publicationScience of Cyber Security - 6th International Conference, SciSec 2024, Proceedings
EditorsJun Zhao, Weizhi Meng
PublisherSpringer Science and Business Media Deutschland GmbH
Pages138-157
Number of pages20
ISBN (Print)9789819624164
DOIs
StatePublished - 2025
Externally publishedYes
Event6th International Conference on Science of Cyber Security, SciSec 2024 - Copenhagen, Denmark
Duration: Aug 14 2024Aug 16 2024

Publication series

NameLecture Notes in Computer Science
Volume15441 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Science of Cyber Security, SciSec 2024
Country/TerritoryDenmark
CityCopenhagen
Period8/14/248/16/24

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Keywords

  • Code Vulnerability Mitigation
  • Cybersecurity
  • Deep Learning Applications
  • Graph Attention Convolutional Neural Network (GAT)
  • Knowledge Graph
  • Network Analysis
  • Node Centrality Metrics
  • open source
  • package upgrade
  • Package Vulnerability Analysis

Fingerprint

Dive into the research topics of 'Graph-Based Profiling of Dependency Vulnerability Remediation'. Together they form a unique fingerprint.

Cite this