The life cycle of vulnerabilities in the representations of software for telecommunication devices | IEEE Conference Publication | IEEE Xplore