{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T19:38:14Z","timestamp":1773517094765,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["19ZR1404800"],"award-info":[{"award-number":["19ZR1404800"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013105","name":"Shanghai Rising-Star Program","doi-asserted-by":"publisher","award":["21QA1400700"],"award-info":[{"award-number":["21QA1400700"]}],"id":[{"id":"10.13039\/501100013105","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836210,U1836213,U1736208,61972099,62172105,62102093"],"award-info":[{"award-number":["U1836210,U1836213,U1736208,61972099,62172105,62102093"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484594","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"3300-3317","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Facilitating Vulnerability Assessment through PoC Migration"],"prefix":"10.1145","author":[{"given":"Jiarun","family":"Dai","sequence":"first","affiliation":[{"name":"Fudan University, Shanghai, UNK, China"}]},{"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, UNK, China"}]},{"given":"Hailong","family":"Xu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, UNK, China"}]},{"given":"Haiming","family":"Lyu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, UNK, China"}]},{"given":"Zicheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, UNK, China"}]},{"given":"Xinyu","family":"Xing","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, Philadelphia, PA, USA"}]},{"given":"Min","family":"Yang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, UNK, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. BinDiff. https:\/\/www.zynamics.com\/bindiff.html."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. National Vulnerability Database. https:\/\/nvd.nist.gov\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2021. PIN Tools. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/pin-a-dynamic-binary-instrumentation-tool.html."},{"key":"e_1_3_2_1_6_1","unstructured":"2021. PolyTracker. https:\/\/github.com\/trailof bits\/polytracker."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security)","author":"Blazytko Tim","year":"2020","unstructured":"Tim Blazytko, Moritz Schl\u00f6 gel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon W\u00f6 rner, and Thorsten Holz. 2020. AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. In Proceedings of the 29th USENIX Security Symposium (USENIX Security), Virtual Event, USA. 235--252."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106285"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00002"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security)","author":"Dai Jiarun","year":"2020","unstructured":"Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, and Zhemin Yang. 2020. BScout: Direct Whole Patch Presence Test for Java Executables. In Proceedings of the 29th USENIX Security Symposium (USENIX Security), Virtual Event, USA. 1147--1164."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908126"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security)","author":"Dong Ying","year":"2019","unstructured":"Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, and Gang Wang. 2019. Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. In Proceedings of the 28th USENIX Security Symposium (USENIX Security), Santa Clara, CA, USA. 869--885."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security)","author":"Gan Shuitao","year":"2020","unstructured":"Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, and Zuoning Chen. 2020. GREYONE: Data Flow Sensitive Fuzzing. In Proceedings of the 29th USENIX Security Symposium (USENIX Security), Virtual Event, USA. 2577--2594."},{"key":"e_1_3_2_1_22_1","volume-title":"Godfrey and Lijie Zou","author":"Michael","year":"2015","unstructured":"Michael W. Godfrey and Lijie Zou. 2015. Using Origin Analysis to Detect Merging and Splitting of Source Code Entities. In Proceedings of the IEEE Trans. Software Eng. (TSE). 166--181."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542527"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.13"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417240"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155608"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054807"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00044"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354244"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security)","author":"Mu Dongliang","year":"2018","unstructured":"Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, and Gang Wang. 2018. Understanding the Reproducibility of Crowd-reported Security Vulnerabilities. In Proceedings of the 27th USENIX Security Symposium (USENIX Security), Baltimore, MD, USA. 919--936."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00090"},{"key":"e_1_3_2_1_36_1","volume-title":"Black","author":"Murphy-Hill Emerson R.","year":"2012","unstructured":"Emerson R. Murphy-Hill, Chris Parnin, and Andrew P. Black. 2012. How We Refactor, and How We Know It. In Proceedings of the IEEE Trans. Software Eng. (TSE). 5--18."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Eugene W. Myers. 1986. An O(ND) Difference Algorithm and its Variations. In Algorithmica. 251--266.","DOI":"10.1007\/BF01840446"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362621"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","author":"Nguyen Manh-Dung","year":"2020","unstructured":"Manh-Dung Nguyen, S\u00e9bastien Bardin, Richard Bonichon, Roland Groz, and Matthieu Lemerre. 2020. Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities. In Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Virtual Event, USA. 47--62."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security)","author":"\u00d6sterlund Sebastian","year":"2020","unstructured":"Sebastian \u00d6sterlund, Kaveh Razavi, Herbert Bos, and Giuffrida Cristiano. 2020. ParmeSan: Sanitizer-guided Greybox Fuzzing. In Proceedings of the 29th USENIX Security Symposium (USENIX Security), Virtual Event, USA. 2289--2306."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.08.004"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664269"},{"key":"e_1_3_2_1_44_1","volume-title":"Metzener","author":"Ratcliff John W.","year":"1998","unstructured":"John W. Ratcliff and David E. Metzener. 1998. Ratcliff-obershelp Pattern Recognition. In Dictionary of Algorithms and Data Structures (DADS)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.682181"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"e_1_3_2_1_47_1","unstructured":"Pang-Ning Tan et al. 2006. Introduction to Data Mining."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484593"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180206"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380386"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380396"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security)","author":"Xiao Yang","year":"2020","unstructured":"Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, and Wenchang Shi. 2020. MVP: Detecting Vulnerabilities using Patch-enhanced Vulnerability Signatures. In Proceedings of the 29th USENIX Security Symposium (USENIX Security), Virtual Event, USA. 1165--1182."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978340"},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security)","author":"Xu Jun","year":"2017","unstructured":"Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, and Bing Mao. 2017. Postmortem Program Analysis with Hardware-enhanced Post-crash Artifacts. In Proceedings of the 26th USENIX Security Symposium (USENIX Security), Vancouver, BC, Canada. 17--32."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397361"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00057"},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security)","author":"Zhang Hang","year":"2018","unstructured":"Hang Zhang and Zhiyun Qian. 2018. Precise and Accurate Patch Presence Test for Binaries. In Proceedings of the 27th USENIX Security Symposium (USENIX Security), Baltimore, MD, USA. 887--902."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081738"},{"key":"e_1_3_2_1_59_1","volume-title":"Detecting Third-party Libraries in Android Applications with High Precision and Recall. In IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"Zhang Yuan","year":"2018","unstructured":"Yuan Zhang, Jiarun Dai, Xiaohan Zhang, Sirong Huang, Zhemin Yang, Min Yang, and Hao Chen. 2018. Detecting Third-party Libraries in Android Applications with High Precision and Recall. In IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), Campobasso, Italy. 141--152."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23492"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484594","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:45:28Z","timestamp":1763498728000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484594"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":60,"alternative-id":["10.1145\/3460120.3484594","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484594","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}