FORTIFY: Feature-Oriented Representation and Graph Topology Integration for Path-Level Vulnerability Detection

dc.citation.issue4
dc.citation.volume22
dc.contributor.authorMa P
dc.contributor.authorLi M
dc.contributor.authorYang Z
dc.contributor.authorZhao Z
dc.contributor.authorLiu H
dc.contributor.authorWang R
dc.contributor.editorKaeli D
dc.date.accessioned2026-02-16T00:16:09Z
dc.date.issued2025-12-16
dc.description.abstractSource code vulnerability detection via graph learning is one of the most important approaches to maintain software security, as it enables structural analysis of semantic dependencies within programs. However, it may suffer from vulnerability coverage, semantic sparsity, trigger path identification, especially when those vulnerabilities do not involve API/library calls. In this article, we present FORTIFY, a graph learning framework that couples feature representation tightly with program topology to perform path-level vulnerability detection. Beginning with a program dependence graph, FORTIFY reconstructs its Sliced Combined Graph (SCG) using program slicing with diverse edges. The SCG is then generated as a weighted edge hypergraph, enabling the model to capture both local semantic and structure relationships. Through path embeddings, we introduce an adaptive hyperedge-aware strategy to allocate high capacity vectors reaching security sensitive nodes. A relation-aware graph convolutional network, equipped with risk sensitive attention and an Information Noise Contrastive Estimation (InfoNCE) objective, further amplifying the weights of high risk paths. Experimental results on the publicly available datasets (i.e., SARD, NVD, and FFmpeg-Vul) show that FORTIFY can identify the execution paths of vulnerabilities. We also test it on real world software such as the PX4 open-source drone, and it finds that there are control type vulnerabilities in PX4, verifying that FORTIFY can be used for the analysis of programs including unmanned agents. The implementation of FORTIFY is publicly available at https://github.com/ACoTAI/FORTIFY.
dc.description.confidentialfalse
dc.edition.editionDecember 2025
dc.identifier.citationMa P, Li M, Yang Z, Zhao Z, Liu H, Wang R. (2025). FORTIFY: Feature-Oriented Representation and Graph Topology Integration for Path-Level Vulnerability Detection. ACM Transactions on Architecture and Code Optimization. 22. 4.
dc.identifier.doi10.1145/3777420
dc.identifier.eissn1544-3973
dc.identifier.elements-typejournal-article
dc.identifier.issn1544-3566
dc.identifier.number164
dc.identifier.urihttps://mro.massey.ac.nz/handle/10179/74141
dc.languageEnglish
dc.publisherAssociation for Computing Machinery (ACM)
dc.publisher.urihttps://dl.acm.org/doi/10.1145/3777420
dc.relation.isPartOfACM Transactions on Architecture and Code Optimization
dc.rightsCC BY 4.0
dc.rights(c) 2025 The Author/s
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.subjectSource code vulnerability detection
dc.subjectgraph convolutional networks
dc.subjectprogram dependence graphs
dc.subjectsoftware security
dc.subjectgraph learning
dc.titleFORTIFY: Feature-Oriented Representation and Graph Topology Integration for Path-Level Vulnerability Detection
dc.typeJournal article
pubs.elements-id609224
pubs.organisational-groupOther

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
609224 PDF.pdf
Size:
4.9 MB
Format:
Adobe Portable Document Format
Description:
Published version.pdf

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
9.22 KB
Format:
Plain Text
Description:

Collections