Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessBest last-minute Amazon Spring Sale tablet deals 2026ZDNet Big DataBuilding a RAG Pipeline From Scratch With LangChain + Pinecone + Claude: A Real ImplementationDEV CommunityWe Built an AI That Rewrites Its Own Brain. Here's What Happened.DEV CommunityCome ho costruito un generatore di testi AI moderno con React e VercelDEV CommunityHow CoinFello's MinChi Park Built the Trust Layer 500 Million Crypto Users Have Been Waiting ForHackernoon AII'm 18 and Built an Open-Source Camera That Cryptographically Proves Photos Are RealDEV CommunityMastering FastAPI: A Complete Learning RoadmapDEV CommunityI Built an AI Chatbot That Knows Everything About MeDEV CommunityEscaping API Quotas: How I Built a Local 14B Multi-Agent Squad for 16GB VRAM (Qwen3.5 & DeepSeek-R1)DEV CommunityI Built a FusionAuth SDK in Brainfuck and I'm Not Even a DeveloperDEV CommunityBattle Mage: We Built a Codebase Expert That Lives in SlackDEV CommunityBest Amazon Spring Sale deals under $25: Last chance to saveZDNet AIBlack Hat USADark ReadingBlack Hat AsiaAI BusinessBest last-minute Amazon Spring Sale tablet deals 2026ZDNet Big DataBuilding a RAG Pipeline From Scratch With LangChain + Pinecone + Claude: A Real ImplementationDEV CommunityWe Built an AI That Rewrites Its Own Brain. Here's What Happened.DEV CommunityCome ho costruito un generatore di testi AI moderno con React e VercelDEV CommunityHow CoinFello's MinChi Park Built the Trust Layer 500 Million Crypto Users Have Been Waiting ForHackernoon AII'm 18 and Built an Open-Source Camera That Cryptographically Proves Photos Are RealDEV CommunityMastering FastAPI: A Complete Learning RoadmapDEV CommunityI Built an AI Chatbot That Knows Everything About MeDEV CommunityEscaping API Quotas: How I Built a Local 14B Multi-Agent Squad for 16GB VRAM (Qwen3.5 & DeepSeek-R1)DEV CommunityI Built a FusionAuth SDK in Brainfuck and I'm Not Even a DeveloperDEV CommunityBattle Mage: We Built a Codebase Expert That Lives in SlackDEV CommunityBest Amazon Spring Sale deals under $25: Last chance to saveZDNet AI

Software Vulnerability Detection Using a Lightweight Graph Neural Network

arXiv cs.SEby Miles Farmer, Ekincan Ufuktepe, Anne Watson, Hialo Muniz Carvalho, Vadim Okun, Zineb Maasaoui, Kannappan PalaniappanApril 1, 20261 min read0 views
Source Quiz

arXiv:2603.29216v1 Announce Type: new Abstract: Large Language Models (LLMs) have emerged as a popular choice in vulnerability detection studies given their foundational capabilities, open source availability, and variety of models, but have limited scalability due to extensive compute requirements. Using the natural graph relational structure of code, we show that our proposed graph neural network (GNN) based deep learning model VulGNN for vulnerability detection can achieve performance almost on par with LLMs, but is 100 times smaller in size and fast to retrain and customize. We describe the VulGNN architecture, ablation studies on components, learning rates, and generalizability to different code datasets. As a lightweight model for vulnerability analysis, VulGNN is efficient and deplo

View PDF HTML (experimental)

Abstract:Large Language Models (LLMs) have emerged as a popular choice in vulnerability detection studies given their foundational capabilities, open source availability, and variety of models, but have limited scalability due to extensive compute requirements. Using the natural graph relational structure of code, we show that our proposed graph neural network (GNN) based deep learning model VulGNN for vulnerability detection can achieve performance almost on par with LLMs, but is 100 times smaller in size and fast to retrain and customize. We describe the VulGNN architecture, ablation studies on components, learning rates, and generalizability to different code datasets. As a lightweight model for vulnerability analysis, VulGNN is efficient and deployable at the edge as part of real-world software development pipelines.

Comments: 12 pages, 3 figures, preprint of journal submission

Subjects:

Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Cite as: arXiv:2603.29216 [cs.SE]

(or arXiv:2603.29216v1 [cs.SE] for this version)

https://doi.org/10.48550/arXiv.2603.29216

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Ekincan Ufuktepe [view email] [v1] Tue, 31 Mar 2026 03:31:41 UTC (1,394 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

modellanguage modelneural network

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Software Vu…modellanguage mo…neural netw…announceopen sourceanalysisarXiv cs.SE

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 230 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Models