How Far Are We? An Empirical Analysis of Current Vulnerability Localization Approaches
By: Haoran Xu , Zhi Chen , Junxiao Han and more
Potential Business Impact:
Finds computer bugs faster and more accurately.
Open-source software vulnerability patch detection is a critical component for maintaining software security and ensuring software supply chain integrity. Traditional manual detection methods face significant scalability challenges when processing large volumes of commit histories, while being prone to human errors and omissions. Existing automated approaches, including heuristic-based methods and pre-trained model solutions, suffer from limited accuracy, poor generalization capabilities, and inherent methodological constraints that hinder their practical deployment. To address these fundamental challenges, this paper conducts a comprehensive empirical study of existing vulnerability patch detection methods, revealing four key insights that guide the design of effective solutions: the critical impact of search space reduction, the superiority of pre-trained semantic understanding over architectural complexity, the temporal limitations of web crawling approaches, and the advantages of knowledge-driven methods. Based on these insights, we propose a novel two-stage framework that combines version-driven candidate filtering with large language model-based multi-round dialogue voting to achieve accurate and efficient vulnerability patch identification. Extensive experiments on a dataset containing 750 real vulnerabilities demonstrate that our method outperforms current approaches.
Similar Papers
Vulnerability-Affected Versions Identification: How Far Are We?
Software Engineering
Finds which computer programs have security problems.
Vulnerability-Affected Versions Identification: How Far Are We?
Software Engineering
Finds computer bugs faster and more accurately.
Deep Learning Aided Software Vulnerability Detection: A Survey
Software Engineering
Finds hidden computer bugs before hackers do.