FORTIFY: Feature-Oriented Representation and Graph Topology Integration for Path-Level Vulnerability Detection

Loading...
Thumbnail Image

DOI

Open Access Location

Journal Title

Journal ISSN

Volume Title

Publisher

Association for Computing Machinery (ACM)

Rights

CC BY 4.0
(c) 2025 The Author/s

Abstract

Source code vulnerability detection via graph learning is one of the most important approaches to maintain software security, as it enables structural analysis of semantic dependencies within programs. However, it may suffer from vulnerability coverage, semantic sparsity, trigger path identification, especially when those vulnerabilities do not involve API/library calls. In this article, we present FORTIFY, a graph learning framework that couples feature representation tightly with program topology to perform path-level vulnerability detection. Beginning with a program dependence graph, FORTIFY reconstructs its Sliced Combined Graph (SCG) using program slicing with diverse edges. The SCG is then generated as a weighted edge hypergraph, enabling the model to capture both local semantic and structure relationships. Through path embeddings, we introduce an adaptive hyperedge-aware strategy to allocate high capacity vectors reaching security sensitive nodes. A relation-aware graph convolutional network, equipped with risk sensitive attention and an Information Noise Contrastive Estimation (InfoNCE) objective, further amplifying the weights of high risk paths. Experimental results on the publicly available datasets (i.e., SARD, NVD, and FFmpeg-Vul) show that FORTIFY can identify the execution paths of vulnerabilities. We also test it on real world software such as the PX4 open-source drone, and it finds that there are control type vulnerabilities in PX4, verifying that FORTIFY can be used for the analysis of programs including unmanned agents. The implementation of FORTIFY is publicly available at https://github.com/ACoTAI/FORTIFY.

Description

Citation

Ma P, Li M, Yang Z, Zhao Z, Liu H, Wang R. (2025). FORTIFY: Feature-Oriented Representation and Graph Topology Integration for Path-Level Vulnerability Detection. ACM Transactions on Architecture and Code Optimization. 22. 4.

Collections

Endorsement

Review

Supplemented By

Referenced By

Creative Commons license

Except where otherwised noted, this item's license is described as CC BY 4.0