SlideShare a Scribd company logo
GNN
PROACTIVEVULNERABILITYDETECTIONUSINGGRAPHNEURALNETWORKS(GNNS)
Transforming Software Security with AI
XHIELD.TECH
BYRANJANKUMARBAISAK
THE
CHALLENGE
Codebases are becoming massive and
complex.
Traditional static analysis tools often
miss vulnerabilities.
Security testing is reactive, not
proactive.
NEURALNETWORKSINCODE
ANALYSIS
How Neural Networks Help:
Learn patterns of insecure code
from historical data.
Generalize across languages and
styles.
Predict potential vulnerabilities early
in the SDLC (Software Development
Life Cycle).
WHYGRAPHNEURAL
NETWORKS(GNNS)?
Code is a Graph:
Code can be represented as ASTs
(AbstractSyntax Trees), Control Flow Graphs,
or Call Graphs.
GNNs understand structured data:
Nodes = code elements (functions, variables,
classes)
Edges = relationships (calls, dependencies,
inheritance)
GNNs naturally fit code structure better
than CNNs or RNNs.
HOWGNNSANALYZECODE
Predict vulnerability scores at node or
graph level
Parse code into a graph (AST/CFG/PDG)
Initialize node embeddings (syntax, type
info, etc.)
Message passing between nodes (learn
context)
PROPERGNNDESIGNFOR
VULNERABILITYDETECTION
Graph Construction: AST + semantic information (e.g.,
variable types, data flow)
Rich Node Features: Token types, function names, data
types
Deep Message Passing: Capture long-range
dependencies (e.g., taint flows)
Attention Mechanisms: Focus on critical code paths
Multi-task Learning: Predict multiple vulnerability types
at once
BENEFITSOF
GNN-BasedDetection
Proactive Access: Predict unknown (zero-day)
vulnerabilities based on patterns.
Scalable: Works across large codebases automatically..
Explainable AI: Highlight suspicious code snippets
(important for developer trust).
REAL-WORLD
APPLICATIONS
Facebook’s “SapFix” and “Getafix” for
automated bug fixing
Microsoft’s “DeepVul” model for
vulnerability detection
AI is a tool, not a threat!
Open-source projects like Code
Property Graphs (CPG).
CHALLENGESAND
LIMITATIONS
Labelled data scarcity for vulnerabilities
Imbalanced datasets (few vulnerabilities vs lots of clean
code)
Risk of false positives/negatives
Model interpretability
FUTUREOPPORTUNITIES
Combining GNNs with Large Language Models (LLMs)
Dynamic analysis + static GNN models
Automated code patch suggestions
Self-training with weak supervision
CONCLUSION
GNNs represent a powerful frontier for proactive
vulnerability detection.
With the right design and training, GNNs can shift
security left, saving organizations millions.
"Think like an attacker, code like a graph!"
THANKYOU!
REAL-WORLDAPPLICATIONS
CHALLENGES
OR
THEIMPORTANCEOF
PRECISION
Why it matters:
High false positive rates = Developer fatigue
False trust can be worse than no detection
Security tools must be reliable and explainable
STRATEGY#1—BETTERGRAPHDESIGN
Combine AST + Control Flow Graph + Data Flow
Graph
Enrich nodes with:
Token type, data type, symbol role
API risk classification
Diagram: Side-by-side of AST vs Hybrid Graph
STRATEGY#2—CLEANANDBALANCED
DATA
Use high-quality, labeled datasets (e.g., Juliet,
Devign, CodeXGLUE)
Address data imbalance:
Oversample rare vulnerabilities
Apply cost-sensitive loss functions
Visual: Pie chart of class imbalance and how
sampling improves it
STRATEGY#3—FOCUSWITHATTENTION
Add attention layers to the GNN
Prioritize user input, dangerous function calls,
control paths
Highlight how attention reduces noise from
irrelevant code
Diagram: GNN with attention heatmap on code
graph
STRATEGY#4—POST-PREDICTION
FILTERING
Rule-based filtering after GNN output:
Example: Reject if input is already sanitized
Hybrid model = AI + domain rules
Benefits:
Remove obvious FPs
Improve trust in model output
STRATEGY#5—EXPLAINABILITY
Use GNNExplainer or saliency maps for:
Highlighting vulnerable code paths
Making predictions interpretable
Screenshot: Sample output with highlighted risky
lines
STRATEGY#6—FEEDBACKLOOP
Deploy GNN with human feedback
Collect true/false positive flags from developers
Periodically fine-tune model using this data
Visual: Lifecycle diagram of GNN improvement via
feedback
STRATEGY#7—ENSEMBLEMODELS
Combine multiple GNN types (GAT, GCN,
GraphSAGE)
Cross-validate predictions → majority voting or
learned fusion
Lower model variance = fewer false alarms
SUMMARYTABLE
FINALTHOUGHTS
GNNs are powerful, but not perfect.
Combining machine learning + human insight is key.
The goal: Actionable, accurate, explainable
vulnerability detection.
REFERNCES
GNNs for Code Representation & Vulnerability Detection
[1] Allamanis, M., Barr, E. T., Devanbu, P., & Sutton, C. (2018). A Survey of Machine Learning for Big Code and
Naturalness.
DOI: 10.1145/3212695
Overview of ML and GNNs for code representation.
[2] Zhou, Y., Liu, S., Siow, J., Du, X., & Liu, Y. (2019). Devign: Effective Vulnerability Identification by Learning Comprehensive
Program Semantics via Graph Neural Networks.
GNNs are powerful, but not perfect.
Combining machine learning + human insight is key.
The goal: Actionable, accurate, explainable vulnerability detection.
Introduced GNN-based vulnerability detection using joint AST/CFG models.
[3] Lin, Z., Sun, Y., Wang, H., Wang, Z., & Liu, X. (2020). Graph-based Deep Learning for Software Vulnerability Detection: A
Survey.
GNNs are powerful, but not perfect.
Combining machine learning + human insight is key.
The goal: Actionable, accurate, explainable vulnerability detection.
Comprehensive survey of graph-based vulnerability detection methods.
REFERNCES
Graph Construction & Feature Engineering
[4] Fernandes, E., Pauck, F., & Bodden, E. (2022). A Review of Graph Representations for Source Code.
Discusses AST, PDG, DFG, and hybrid graph approaches.
https://arxiv.org/abs/2211.03138
[5] Yamaguchi, F., Golde, N., Arp, D., & Rieck, K. (2014). Modeling and discovering vulnerabilities with code property graphs.
https://www.usenix.org/system/files/conference/sp14/sp14-paper-yamaguchi.pdf
Seminal work introducing Code Property Graphs (CPG) for vulnerability mining.
Reducing False Positives
[6] Demetrio, L., Pascarella, L., Palomba, F., & Russo, B. (2021). An Empirical Evaluation of Vulnerability Prediction
Models Using Real-World Data.
https://arxiv.org/abs/2103.06788
Highlights the need for realistic training data and discusses model overfitting and false positives.
[7] Shastry, S., & Sankaranarayanan, S. (2022). Improving Software Vulnerability Detection using Ensemble Learning.
Shows benefits of combining multiple models to reduce noise and improve accuracy.
[8] Wang, S., Liu, S., Yang, J., Zhang, X., & Chen, Z. (2022). AlphaVul: Exploiting Attention and Multi-View Graph Learning
for Vulnerability Detection.
https://arxiv.org/abs/2203.05396, Demonstrates the use of attention layers in GNNs for code vulnerability detection.
REFERNCES
Explainability in GNNs
[9] Ying, R., Bourgeois, D., You, J., Zitnik, M., & Leskovec, J. (2019). GNNExplainer: Generating Explanations for Graph Neural
Networks.
[10] Ribeiro, M. T., Singh, S., & Guestrin, C. (2016). “Why Should I Trust You?” Explaining the Predictions of Any Classifier.
CONTACT
RANJANKUMARBAISAK
RANJAN.BAISAK@GMAIL.COM
+919880398951
Ad

More Related Content

Similar to Proactive Vulnerability Detection in Source Code Using Graph Neural Networks: Reducing False Positives and Improving Reliability (20)

Survey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning ModelsSurvey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning Models
IRJET Journal
 
Ramakeerthi_1+yr_resume
Ramakeerthi_1+yr_resumeRamakeerthi_1+yr_resume
Ramakeerthi_1+yr_resume
botcha ramakeerthi
 
SANN: Programming Code Representation Using Attention Neural Network with Opt...
SANN: Programming Code Representation Using Attention Neural Network with Opt...SANN: Programming Code Representation Using Attention Neural Network with Opt...
SANN: Programming Code Representation Using Attention Neural Network with Opt...
Peter Brusilovsky
 
Omkar revankar resume
Omkar revankar resume Omkar revankar resume
Omkar revankar resume
OmkarRevankar1
 
Sw Software Design
Sw Software DesignSw Software Design
Sw Software Design
jonathan077070
 
NetFense Adversarial Defenses Against Privacy Attacks on Neural Networks for ...
NetFense Adversarial Defenses Against Privacy Attacks on Neural Networks for ...NetFense Adversarial Defenses Against Privacy Attacks on Neural Networks for ...
NetFense Adversarial Defenses Against Privacy Attacks on Neural Networks for ...
Shakas Technologies
 
Resume_Vignesh_ThulasiDass
Resume_Vignesh_ThulasiDass Resume_Vignesh_ThulasiDass
Resume_Vignesh_ThulasiDass
VigneshThulasiDass
 
Chandra_CV 3 8Yr Exp
Chandra_CV 3 8Yr Exp Chandra_CV 3 8Yr Exp
Chandra_CV 3 8Yr Exp
Chandrashekar Murthy c n
 
Jain_Navya_resume
Jain_Navya_resumeJain_Navya_resume
Jain_Navya_resume
Navya Jain
 
Ashutosh jaimini resume
Ashutosh jaimini resumeAshutosh jaimini resume
Ashutosh jaimini resume
rit2007062
 
Ashutosh jaimini resume
Ashutosh jaimini resumeAshutosh jaimini resume
Ashutosh jaimini resume
rit2007062
 
1st review android malware.pptx
1st review  android malware.pptx1st review  android malware.pptx
1st review android malware.pptx
Nambiraju
 
Topic 1 PBO
Topic 1 PBOTopic 1 PBO
Topic 1 PBO
Imanuel Nugroho
 
Leveraging Grad-CAM to Improve the Accuracy of Network Intrusion Detection Sy...
Leveraging Grad-CAM to Improve the Accuracy of Network Intrusion Detection Sy...Leveraging Grad-CAM to Improve the Accuracy of Network Intrusion Detection Sy...
Leveraging Grad-CAM to Improve the Accuracy of Network Intrusion Detection Sy...
Francesco Paolo Caforio
 
Hunlan Lin_resume
Hunlan Lin_resumeHunlan Lin_resume
Hunlan Lin_resume
hunlan lin
 
kavita_resume_3
kavita_resume_3kavita_resume_3
kavita_resume_3
Kavita Raghunathan
 
IRJET- Effective Technique Used for Malware Detection using Machine Learning
IRJET-  	  Effective Technique Used for Malware Detection using Machine LearningIRJET-  	  Effective Technique Used for Malware Detection using Machine Learning
IRJET- Effective Technique Used for Malware Detection using Machine Learning
IRJET Journal
 
Neo4j GraphTalk Helsinki - Next-Gerneation Telecommunication Solutions with N...
Neo4j GraphTalk Helsinki - Next-Gerneation Telecommunication Solutions with N...Neo4j GraphTalk Helsinki - Next-Gerneation Telecommunication Solutions with N...
Neo4j GraphTalk Helsinki - Next-Gerneation Telecommunication Solutions with N...
Neo4j
 
Dipalee Shah Resume
Dipalee Shah ResumeDipalee Shah Resume
Dipalee Shah Resume
Dipalee Shah
 
Approximating Attack Surfaces with Stack Traces [ICSE 15]
Approximating Attack Surfaces with Stack Traces [ICSE 15]Approximating Attack Surfaces with Stack Traces [ICSE 15]
Approximating Attack Surfaces with Stack Traces [ICSE 15]
Chris Theisen
 
Survey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning ModelsSurvey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning Models
IRJET Journal
 
SANN: Programming Code Representation Using Attention Neural Network with Opt...
SANN: Programming Code Representation Using Attention Neural Network with Opt...SANN: Programming Code Representation Using Attention Neural Network with Opt...
SANN: Programming Code Representation Using Attention Neural Network with Opt...
Peter Brusilovsky
 
Omkar revankar resume
Omkar revankar resume Omkar revankar resume
Omkar revankar resume
OmkarRevankar1
 
NetFense Adversarial Defenses Against Privacy Attacks on Neural Networks for ...
NetFense Adversarial Defenses Against Privacy Attacks on Neural Networks for ...NetFense Adversarial Defenses Against Privacy Attacks on Neural Networks for ...
NetFense Adversarial Defenses Against Privacy Attacks on Neural Networks for ...
Shakas Technologies
 
Jain_Navya_resume
Jain_Navya_resumeJain_Navya_resume
Jain_Navya_resume
Navya Jain
 
Ashutosh jaimini resume
Ashutosh jaimini resumeAshutosh jaimini resume
Ashutosh jaimini resume
rit2007062
 
Ashutosh jaimini resume
Ashutosh jaimini resumeAshutosh jaimini resume
Ashutosh jaimini resume
rit2007062
 
1st review android malware.pptx
1st review  android malware.pptx1st review  android malware.pptx
1st review android malware.pptx
Nambiraju
 
Leveraging Grad-CAM to Improve the Accuracy of Network Intrusion Detection Sy...
Leveraging Grad-CAM to Improve the Accuracy of Network Intrusion Detection Sy...Leveraging Grad-CAM to Improve the Accuracy of Network Intrusion Detection Sy...
Leveraging Grad-CAM to Improve the Accuracy of Network Intrusion Detection Sy...
Francesco Paolo Caforio
 
Hunlan Lin_resume
Hunlan Lin_resumeHunlan Lin_resume
Hunlan Lin_resume
hunlan lin
 
IRJET- Effective Technique Used for Malware Detection using Machine Learning
IRJET-  	  Effective Technique Used for Malware Detection using Machine LearningIRJET-  	  Effective Technique Used for Malware Detection using Machine Learning
IRJET- Effective Technique Used for Malware Detection using Machine Learning
IRJET Journal
 
Neo4j GraphTalk Helsinki - Next-Gerneation Telecommunication Solutions with N...
Neo4j GraphTalk Helsinki - Next-Gerneation Telecommunication Solutions with N...Neo4j GraphTalk Helsinki - Next-Gerneation Telecommunication Solutions with N...
Neo4j GraphTalk Helsinki - Next-Gerneation Telecommunication Solutions with N...
Neo4j
 
Dipalee Shah Resume
Dipalee Shah ResumeDipalee Shah Resume
Dipalee Shah Resume
Dipalee Shah
 
Approximating Attack Surfaces with Stack Traces [ICSE 15]
Approximating Attack Surfaces with Stack Traces [ICSE 15]Approximating Attack Surfaces with Stack Traces [ICSE 15]
Approximating Attack Surfaces with Stack Traces [ICSE 15]
Chris Theisen
 

More from Ranjan Baisak (6)

Cloud Native Migration Steps
Cloud Native Migration StepsCloud Native Migration Steps
Cloud Native Migration Steps
Ranjan Baisak
 
PR agency - a personalized marketing analysis platform
PR agency - a personalized marketing analysis platformPR agency - a personalized marketing analysis platform
PR agency - a personalized marketing analysis platform
Ranjan Baisak
 
CabXury - a social cab sharing service
CabXury - a social cab sharing serviceCabXury - a social cab sharing service
CabXury - a social cab sharing service
Ranjan Baisak
 
Semantic based Enterprise Search Solution in Networking Domain
Semantic based Enterprise Search Solution in Networking DomainSemantic based Enterprise Search Solution in Networking Domain
Semantic based Enterprise Search Solution in Networking Domain
Ranjan Baisak
 
Micro Services Architecture
Micro Services ArchitectureMicro Services Architecture
Micro Services Architecture
Ranjan Baisak
 
Docker : Container Virtualization
Docker : Container VirtualizationDocker : Container Virtualization
Docker : Container Virtualization
Ranjan Baisak
 
Cloud Native Migration Steps
Cloud Native Migration StepsCloud Native Migration Steps
Cloud Native Migration Steps
Ranjan Baisak
 
PR agency - a personalized marketing analysis platform
PR agency - a personalized marketing analysis platformPR agency - a personalized marketing analysis platform
PR agency - a personalized marketing analysis platform
Ranjan Baisak
 
CabXury - a social cab sharing service
CabXury - a social cab sharing serviceCabXury - a social cab sharing service
CabXury - a social cab sharing service
Ranjan Baisak
 
Semantic based Enterprise Search Solution in Networking Domain
Semantic based Enterprise Search Solution in Networking DomainSemantic based Enterprise Search Solution in Networking Domain
Semantic based Enterprise Search Solution in Networking Domain
Ranjan Baisak
 
Micro Services Architecture
Micro Services ArchitectureMicro Services Architecture
Micro Services Architecture
Ranjan Baisak
 
Docker : Container Virtualization
Docker : Container VirtualizationDocker : Container Virtualization
Docker : Container Virtualization
Ranjan Baisak
 
Ad

Recently uploaded (20)

Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMeet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Maxim Salnikov
 
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
Egor Kaleynik
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
Adobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install IllustratorAdobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install Illustrator
usmanhidray
 
Salesforce Aged Complex Org Revitalization Process .pdf
Salesforce Aged Complex Org Revitalization Process .pdfSalesforce Aged Complex Org Revitalization Process .pdf
Salesforce Aged Complex Org Revitalization Process .pdf
SRINIVASARAO PUSULURI
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
wareshashahzadiii
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Agentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM modelsAgentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM models
Manish Chopra
 
Maxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINKMaxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINK
younisnoman75
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key  With LatestAdobe Photoshop CC 2025 Crack Full Serial Key  With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
usmanhidray
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMeet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Maxim Salnikov
 
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
Egor Kaleynik
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
Adobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install IllustratorAdobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install Illustrator
usmanhidray
 
Salesforce Aged Complex Org Revitalization Process .pdf
Salesforce Aged Complex Org Revitalization Process .pdfSalesforce Aged Complex Org Revitalization Process .pdf
Salesforce Aged Complex Org Revitalization Process .pdf
SRINIVASARAO PUSULURI
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
wareshashahzadiii
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Agentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM modelsAgentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM models
Manish Chopra
 
Maxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINKMaxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINK
younisnoman75
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key  With LatestAdobe Photoshop CC 2025 Crack Full Serial Key  With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
usmanhidray
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Ad

Proactive Vulnerability Detection in Source Code Using Graph Neural Networks: Reducing False Positives and Improving Reliability

  • 2. THE CHALLENGE Codebases are becoming massive and complex. Traditional static analysis tools often miss vulnerabilities. Security testing is reactive, not proactive.
  • 3. NEURALNETWORKSINCODE ANALYSIS How Neural Networks Help: Learn patterns of insecure code from historical data. Generalize across languages and styles. Predict potential vulnerabilities early in the SDLC (Software Development Life Cycle).
  • 4. WHYGRAPHNEURAL NETWORKS(GNNS)? Code is a Graph: Code can be represented as ASTs (AbstractSyntax Trees), Control Flow Graphs, or Call Graphs. GNNs understand structured data: Nodes = code elements (functions, variables, classes) Edges = relationships (calls, dependencies, inheritance) GNNs naturally fit code structure better than CNNs or RNNs.
  • 5. HOWGNNSANALYZECODE Predict vulnerability scores at node or graph level Parse code into a graph (AST/CFG/PDG) Initialize node embeddings (syntax, type info, etc.) Message passing between nodes (learn context)
  • 6. PROPERGNNDESIGNFOR VULNERABILITYDETECTION Graph Construction: AST + semantic information (e.g., variable types, data flow) Rich Node Features: Token types, function names, data types Deep Message Passing: Capture long-range dependencies (e.g., taint flows) Attention Mechanisms: Focus on critical code paths Multi-task Learning: Predict multiple vulnerability types at once
  • 7. BENEFITSOF GNN-BasedDetection Proactive Access: Predict unknown (zero-day) vulnerabilities based on patterns. Scalable: Works across large codebases automatically.. Explainable AI: Highlight suspicious code snippets (important for developer trust).
  • 8. REAL-WORLD APPLICATIONS Facebook’s “SapFix” and “Getafix” for automated bug fixing Microsoft’s “DeepVul” model for vulnerability detection AI is a tool, not a threat! Open-source projects like Code Property Graphs (CPG).
  • 9. CHALLENGESAND LIMITATIONS Labelled data scarcity for vulnerabilities Imbalanced datasets (few vulnerabilities vs lots of clean code) Risk of false positives/negatives Model interpretability
  • 10. FUTUREOPPORTUNITIES Combining GNNs with Large Language Models (LLMs) Dynamic analysis + static GNN models Automated code patch suggestions Self-training with weak supervision
  • 11. CONCLUSION GNNs represent a powerful frontier for proactive vulnerability detection. With the right design and training, GNNs can shift security left, saving organizations millions. "Think like an attacker, code like a graph!"
  • 14. THEIMPORTANCEOF PRECISION Why it matters: High false positive rates = Developer fatigue False trust can be worse than no detection Security tools must be reliable and explainable
  • 15. STRATEGY#1—BETTERGRAPHDESIGN Combine AST + Control Flow Graph + Data Flow Graph Enrich nodes with: Token type, data type, symbol role API risk classification Diagram: Side-by-side of AST vs Hybrid Graph
  • 16. STRATEGY#2—CLEANANDBALANCED DATA Use high-quality, labeled datasets (e.g., Juliet, Devign, CodeXGLUE) Address data imbalance: Oversample rare vulnerabilities Apply cost-sensitive loss functions Visual: Pie chart of class imbalance and how sampling improves it
  • 17. STRATEGY#3—FOCUSWITHATTENTION Add attention layers to the GNN Prioritize user input, dangerous function calls, control paths Highlight how attention reduces noise from irrelevant code Diagram: GNN with attention heatmap on code graph
  • 18. STRATEGY#4—POST-PREDICTION FILTERING Rule-based filtering after GNN output: Example: Reject if input is already sanitized Hybrid model = AI + domain rules Benefits: Remove obvious FPs Improve trust in model output
  • 19. STRATEGY#5—EXPLAINABILITY Use GNNExplainer or saliency maps for: Highlighting vulnerable code paths Making predictions interpretable Screenshot: Sample output with highlighted risky lines
  • 20. STRATEGY#6—FEEDBACKLOOP Deploy GNN with human feedback Collect true/false positive flags from developers Periodically fine-tune model using this data Visual: Lifecycle diagram of GNN improvement via feedback
  • 21. STRATEGY#7—ENSEMBLEMODELS Combine multiple GNN types (GAT, GCN, GraphSAGE) Cross-validate predictions → majority voting or learned fusion Lower model variance = fewer false alarms
  • 23. FINALTHOUGHTS GNNs are powerful, but not perfect. Combining machine learning + human insight is key. The goal: Actionable, accurate, explainable vulnerability detection.
  • 24. REFERNCES GNNs for Code Representation & Vulnerability Detection [1] Allamanis, M., Barr, E. T., Devanbu, P., & Sutton, C. (2018). A Survey of Machine Learning for Big Code and Naturalness. DOI: 10.1145/3212695 Overview of ML and GNNs for code representation. [2] Zhou, Y., Liu, S., Siow, J., Du, X., & Liu, Y. (2019). Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. GNNs are powerful, but not perfect. Combining machine learning + human insight is key. The goal: Actionable, accurate, explainable vulnerability detection. Introduced GNN-based vulnerability detection using joint AST/CFG models. [3] Lin, Z., Sun, Y., Wang, H., Wang, Z., & Liu, X. (2020). Graph-based Deep Learning for Software Vulnerability Detection: A Survey. GNNs are powerful, but not perfect. Combining machine learning + human insight is key. The goal: Actionable, accurate, explainable vulnerability detection. Comprehensive survey of graph-based vulnerability detection methods.
  • 25. REFERNCES Graph Construction & Feature Engineering [4] Fernandes, E., Pauck, F., & Bodden, E. (2022). A Review of Graph Representations for Source Code. Discusses AST, PDG, DFG, and hybrid graph approaches. https://arxiv.org/abs/2211.03138 [5] Yamaguchi, F., Golde, N., Arp, D., & Rieck, K. (2014). Modeling and discovering vulnerabilities with code property graphs. https://www.usenix.org/system/files/conference/sp14/sp14-paper-yamaguchi.pdf Seminal work introducing Code Property Graphs (CPG) for vulnerability mining. Reducing False Positives [6] Demetrio, L., Pascarella, L., Palomba, F., & Russo, B. (2021). An Empirical Evaluation of Vulnerability Prediction Models Using Real-World Data. https://arxiv.org/abs/2103.06788 Highlights the need for realistic training data and discusses model overfitting and false positives. [7] Shastry, S., & Sankaranarayanan, S. (2022). Improving Software Vulnerability Detection using Ensemble Learning. Shows benefits of combining multiple models to reduce noise and improve accuracy. [8] Wang, S., Liu, S., Yang, J., Zhang, X., & Chen, Z. (2022). AlphaVul: Exploiting Attention and Multi-View Graph Learning for Vulnerability Detection. https://arxiv.org/abs/2203.05396, Demonstrates the use of attention layers in GNNs for code vulnerability detection.
  • 26. REFERNCES Explainability in GNNs [9] Ying, R., Bourgeois, D., You, J., Zitnik, M., & Leskovec, J. (2019). GNNExplainer: Generating Explanations for Graph Neural Networks. [10] Ribeiro, M. T., Singh, S., & Guestrin, C. (2016). “Why Should I Trust You?” Explaining the Predictions of Any Classifier.