
wider range of vulnerabilities or groups of vulnera-
bilities. Moreover, on line-level detection our model
performed slightly worse than LineVul, but still bet-
ter than the other benchmark techniques considered.
Our goal is to explore new approaches to upgrade the
model in this task.
REFERENCES
Ancona, M., Ceolini, E.,
¨
Oztireli, C., and Gross, M. (2018).
Towards better understanding of gradient-based attri-
bution methods for deep neural networks. ICLR.
Chakraborty, S., Krishna, R., Ding, Y., and Ray, B. (2022).
Deep learning based vulnerability detection : Are we
there yet ? IEEE Transactions on Software Engineer-
ing, 48(9):3280–3296.
Chen, Y., Ding, Z., Alowain, L., Chen, X., and Wagner, D.
(2023). DiverseVul: A New Vulnerable Source Code
Dataset for Deep Learning Based Vulnerability Detec-
tion. In Proceedings of the 26th International Sympo-
sium on Research in Attacks, Intrusions and Defenses,
pages 654–668. ACM.
De Sousa, N. T. and Hasselbring, W. (2021). Javabert :
Training a transformer-based model for the java pro-
gramming language. In 2021 36th IEEE / ACM In-
ternational Conference on Automated Software Engi-
neering Workshops ( ASEW ), pages 90–95.
Devlin, J., Chang, M.-W., Lee, K., and Toutanova, K.
(2019). Bert : Pre-training of deep bidirectional trans-
formers for language understanding.
Fan, J., Li, Y., Wang, S., and Nguyen, T. N. (2020). A c
/ c ++ code vulnerability dataset with code changes
and cve summaries. In IEEE/ACM 17th International
Conference on Mining Software Repositories (MSR),
pages 508–512. ACM.
Fang, Y., Li, Y., Liu, L., and Huang, C. (2018). Deepxss :
Cross site scripting detection based on deep learning.
In ACM International Conference Proceeding Series,
pages 47–51. Association for Computing Machinery.
Feng, Z., Guo, D., Tang, D., Duan, N., Feng, X., Gong, M.,
Shou, L., Qin, B., Liu, T., Jiang, D., and Zhou, M.
(2020). Codebert : A pre-trained model for program-
ming and natural languages. Findings of EMNLP.
Fu, M. and Tantithamthavorn, C. (2022). Linevul: A
transformer-based line-level vulnerability prediction.
In 2022 IEEE/ACM 19th International Conference on
Mining Software Repositories (MSR). IEEE.
Ghaffarian, S. M. and Shahriari, H. R. (2017). Software
vulnerability analysis and discovery using machine-
learning and data-mining techniques: A survey. ACM
Computing Surveys (CSUR), 50(4).
Hin, D., Kan, A., Chen, H., and Babar, M. A. (2022).
LineVD: Statement-level vulnerability detection us-
ing graph neural networks. In Proceedings of the 19th
International Conference on Mining Software Reposi-
tories, pages 596–607. ACM.
Kalouptsoglou, I., Siavvas, M., Ampatzoglou, A., Keha-
gias, D., and Chatzigeorgiou, A. (2023). Software
vulnerability prediction: A systematic mapping study.
Information and Software Technology, 164:107303.
Li, Y., Wang, S., and Nguyen, T. N. (2021). Vulnera-
bility detection with fine-grained interpretations. In
Proceedings of the 29th ACM Joint Meeting on Eu-
ropean Software Engineering Conference and Sym-
posium on the Foundations of Software Engineering,
ESEC / FSE, pages 292–303. Association for Com-
puting Machinery.
Lundberg, S. M. and Lee, S.-I. (2017). A unified approach
to interpreting model predictions. In Advances in Neu-
ral Information Processing Systems, volume 30. Cur-
ran Associates, Inc.
Mamede, C., Pinconschi, E., Abreu, R., and Campos, J.
(2022). Exploring transformers for multi-label clas-
sification of java vulnerabilities. In IEEE, editor,
2022 IEEE 22nd International Conference on Soft-
ware Quality , Reliability and Security ( QRS ), pages
43–52.
MITRE (2023). Cwe list version 4.13.
https://cwe.mitre.org/data/index.html. Accessed
15 November 2023.
Rahman, K. and Izurieta, C. (2022). A mapping study of se-
curity vulnerability detection approaches for web ap-
plications. In 2022 48th Euromicro Conference on
Software Engineering and Advanced Applications (
SEAA ), pages 491–494.
Shrikumar, A., Greenside, P., and Kundaje, A. (2017).
Learning important features through propagating ac-
tivation differences. In Proceedings of the 34th In-
ternational Conference on Machine Learning, pages
3145–3153. PMLR.
Simonyan, K., Vedaldi, A., and Zisserman, A. (2014). Deep
inside convolutional networks : Visualising image
classification models and saliency maps.
Singh, K., Grover, S. S., and Kumar, R. K. (2022). Cyber
security vulnerability detection using natural language
processing. In 2022 IEEE World AI IoT Congress (
AIIoT ), pages 174–178.
Sundararajan, M., Taly, A., and Yan, Q. (2017). Axiomatic
attribution for deep networks. In Proceedings of the
34th International Conference on Machine Learning,
pages 3319–3328. PMLR.
Zhou, Y., Liu, S., Siow, J., Du, X., and Liu, Y. (2019). De-
vign: Effective Vulnerability Identification by Learn-
ing Comprehensive Program Semantics via Graph
Neural Networks. In Advances in Neural Information
Processing Systems, volume 32. Curran Associates,
Inc.
Zou, D., Wang, S., Xu, S., Li, Z., and Jin, H. (2021).
µvuldeepecker : A deep learning-based system for
multiclass vulnerability detection. IEEE Transactions
on Dependable and Secure Computing, 18(5):2224–
2236.
MultiVD: A Transformer-based Multitask Approach for Software Vulnerability Detection
423