Automatically discover vulnerability through similar functions | IEEE Conference Publication | IEEE Xplore