Complete Dataset
Sample Case in HTML
Our Primary CVE DataSet
If CVE information is not already uploaded to LinuxFlaw repo, please refer to Virtual Machine for detailed information.
Vmware Workstation Images
Our Usenix Paper
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
If you think our dataset is of help to your work, please cite our following paper. We really appreciate it!
@inproceedings {217567,
author = {Dongliang Mu and Alejandro Cuevas and Limin Yang and Hang Hu and Xinyu Xing and Bing Mao and Gang Wang},
title = {Understanding the Reproducibility of Crowd-reported Security Vulnerabilities},
booktitle = {27th {USENIX} Security Symposium ({USENIX} Security 18)},
year = {2018},
address = {Baltimore, MD},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/mu},
}
Related Publications
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts
Contributor
Dongliang Mu (Contact Me With dzm77@ist.psu.edu)
Xinyu Xing (Assistant Professor in Penn State University)