FORTIFY: Feature-Oriented Representation and Graph Topology Integration for Path-Level Vulnerability Detection
Loading...
Date
DOI
Open Access Location
Journal Title
Journal ISSN
Volume Title
Publisher
Association for Computing Machinery (ACM)
Rights
CC BY 4.0
(c) 2025 The Author/s
(c) 2025 The Author/s
Abstract
Source code vulnerability detection via graph learning is one of the most important approaches to maintain software security, as it enables structural analysis of semantic dependencies within programs. However, it may suffer from vulnerability coverage, semantic sparsity, trigger path identification, especially when those vulnerabilities do not involve API/library calls. In this article, we present FORTIFY, a graph learning framework that couples feature representation tightly with program topology to perform path-level vulnerability detection. Beginning with a program dependence graph, FORTIFY reconstructs its Sliced Combined Graph (SCG) using program slicing with diverse edges. The SCG is then generated as a weighted edge hypergraph, enabling the model to capture both local semantic and structure relationships. Through path embeddings, we introduce an adaptive hyperedge-aware strategy to allocate high capacity vectors reaching security sensitive nodes. A relation-aware graph convolutional network, equipped with risk sensitive attention and an Information Noise Contrastive Estimation (InfoNCE) objective, further amplifying the weights of high risk paths. Experimental results on the publicly available datasets (i.e., SARD, NVD, and FFmpeg-Vul) show that FORTIFY can identify the execution paths of vulnerabilities. We also test it on real world software such as the PX4 open-source drone, and it finds that there are control type vulnerabilities in PX4, verifying that FORTIFY can be used for the analysis of programs including unmanned agents. The implementation of FORTIFY is publicly available at https://github.com/ACoTAI/FORTIFY.
Description
Citation
Ma P, Li M, Yang Z, Zhao Z, Liu H, Wang R. (2025). FORTIFY: Feature-Oriented Representation and Graph Topology Integration for Path-Level Vulnerability Detection. ACM Transactions on Architecture and Code Optimization. 22. 4.
Collections
Endorsement
Review
Supplemented By
Referenced By
Creative Commons license
Except where otherwised noted, this item's license is described as CC BY 4.0

