If CVE information is not already uploaded to LinuxFlaw repo, please refer to Virtual Machine for detailed information.
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
If you think our dataset is of help to your work, please cite our following paper. We really appreciate it!
@inproceedings {217567,
author = {Dongliang Mu and Alejandro Cuevas and Limin Yang and Hang Hu and Xinyu Xing and Bing Mao and Gang Wang},
title = {Understanding the Reproducibility of Crowd-reported Security Vulnerabilities},
booktitle = {27th {USENIX} Security Symposium ({USENIX} Security 18)},
year = {2018},
address = {Baltimore, MD},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/mu},
}
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts
Dongliang Mu (Contact Me With dzm77@ist.psu.edu)
Xinyu Xing (Assistant Professor in Penn State University)