Vulnerability Detection via Topological Analysis of Attention Maps