Convicting exploitable software vulnerabilities: An efficient input provenance based approach | IEEE Conference Publication | IEEE Xplore