Towards Predicting Multi-Vulnerability Attack Chains in Software Supply Chains from Software Bill of Materials Graphs

arXiv cs.LG / 4/8/2026

💬 OpinionSignals & Early TrendsIdeas & Deep AnalysisModels & Research

Key Points

  • The paper argues that SBOM-based security pipelines often treat CVE scanner findings as independent records, missing the cascaded, multi-vulnerability “attack chain” structure common in software supply chain compromises.
  • It proposes a new SBOM-driven graph-learning approach that converts CycloneDX SBOMs enriched with vulnerabilities into heterogeneous graphs with typed relations (e.g., dependency links and vulnerability links).
  • A Heterogeneous Graph Attention Network (HGAT) is trained to predict whether a component is associated with at least one known vulnerability, serving as a feasibility check for learning from this structured evidence.
  • The work further models cascading vulnerabilities as a CVE-pair link prediction task using a lightweight MLP trained on documented multi-vulnerability chains.
  • Experiments on 200 real-world SBOMs from the Wild SBOMs dataset show strong performance (91.03% accuracy, 74.02% F1 for the HGAT classifier; ROC-AUC of 0.93 for the cascade predictor on a seed set of 35 documented chains).

Abstract

Software supply chain security compromises often stem from cascaded interactions of vulnerabilities, for example, between multiple vulnerable components. Yet, Software Bill of Materials (SBOM)-based pipelines for security analysis typically treat scanner findings as independent per-CVE (Common Vulnerabilities and Exposures) records. We propose a new research direction based on learning multi-vulnerability attack chains through a novel SBOM-driven graph-learning approach. This treats SBOM structure and scanner outputs as a dependency-constrained evidence graph rather than a flat list of vulnerabilities. We represent vulnerability-enriched CycloneDX SBOMs as heterogeneous graphs whose nodes capture software components and known vulnerabilities (i.e, CVEs), connected by typed relations, such as dependency and vulnerability links. We train a Heterogeneous Graph Attention Network (HGAT) to predict whether a component is associated with at least one known vulnerability as a feasibility check for learning over this structure. Additionally, we frame the discovery of cascading vulnerabilities as CVE-pair link prediction using a lightweight Multi-Layer Perceptron (MLP) neural network trained on documented multi-vulnerability chains. Validated on 200 real-world SBOMs from the Wild SBOMs public dataset, the HGAT component classifier achieves 91.03% Accuracy and 74.02% F1-score, while the cascade predictor model (MLP) achieves a Receiver Operating Characteristic - Area Under Curve (ROC-AUC) of 0.93 on a seed set of 35 documented attack chains.