Fig. 8From: From proof-of-concept to exploitableThe workflow of exploit synthesisBack to article page