Computing, School of
School of Computing: Dissertations, Theses, and Student Research
First Advisor
Rahul Purandare
Date of this Version
12-2025
Document Type
Thesis
Citation
A thesis presented to the faculty of the Graduate College at the University of Nebraska in partial fulfillment of requirements for the degree of Master of Science
Major: Computer Science
Under the supervision of Professor Rahul Purandare
Lincoln, Nebraska, December 2025
Abstract
Identifying the underlying weakness types and assessing their severity using CWE and CVSS standards are critical steps in software vulnerability management. While timely assessment of vulnerabilities mitigates the impact of severe security incidents, automating joint CWE identification and severity assessment remains challenging due to the heterogeneity of vulnerabilities across different code granularities and programming languages. In addition, generating vulnerability descriptions is often time-consuming, as it requires extensive manual review, validation, and writing by security experts.
In this thesis, we leverage the capabilities of Large Language Models (LLMs) to automate the identification of CWE identifiers and the assessment of their severity using vulnerability descriptions and corresponding vulnerable code at varying levels of granularity. We further extend our approach to automate the process of generating vulnerability descriptions by incorporating vulnerable code along with the identified vulnerability types. Our evaluations employ quantitative and qualitative metrics, robustness checks against potential noise, and manual analysis of the generated artifacts. Our results indicate that fine-tuning LLMs yields consistent improvements across all granularity levels, achieving over a threefold increase in CWE identification, a 17.68% improvement in severity assessment, and a 21.03% improvement in joint prediction over the baseline, while improving the automatic generation of descriptions that more closely mirror NVD entries. These findings highlight the potential of LLM-based approaches in the joint CWE identification and vulnerability assessment across different code granularities, thereby enhancing automated software vulnerability management.
Advisor: Rahul Purandare
Comments
Copyright 2025, Mohammad Jalili Torkamani. Used by permission