Towards an automatic exploit pipeline | IEEE Conference Publication | IEEE Xplore