Towards Predicting Multi-Vulnerability Attack Chains in Software Supply Chains from Software Bill of Materials Graphs
arXiv cs.LG / 4/8/2026
💬 OpinionSignals & Early TrendsIdeas & Deep AnalysisModels & Research
Key Points
- The paper argues that SBOM-based security pipelines often treat CVE scanner findings as independent records, missing the cascaded, multi-vulnerability “attack chain” structure common in software supply chain compromises.
- It proposes a new SBOM-driven graph-learning approach that converts CycloneDX SBOMs enriched with vulnerabilities into heterogeneous graphs with typed relations (e.g., dependency links and vulnerability links).
- A Heterogeneous Graph Attention Network (HGAT) is trained to predict whether a component is associated with at least one known vulnerability, serving as a feasibility check for learning from this structured evidence.
- The work further models cascading vulnerabilities as a CVE-pair link prediction task using a lightweight MLP trained on documented multi-vulnerability chains.
- Experiments on 200 real-world SBOMs from the Wild SBOMs dataset show strong performance (91.03% accuracy, 74.02% F1 for the HGAT classifier; ROC-AUC of 0.93 for the cascade predictor on a seed set of 35 documented chains).
Related Articles

Black Hat Asia
AI Business

Meta's latest model is as open as Zuckerberg's private school
The Register

AI fuels global trade growth as China-US flows shift, McKinsey finds
SCMP Tech

Why multi-agent AI security is broken (and the identity patterns that actually work)
Dev.to
BANKING77-77: New best of 94.61% on the official test set (+0.13pp) over our previous tests 94.48%.
Reddit r/artificial