<?xml version="1.0" encoding="US-ASCII"?>
<dblp>
<inproceedings key="conf/issta/ZhaoJX0WWL0LWB22" mdate="2025-01-19">
<author>Binbin Zhao</author>
<author>Shouling Ji</author>
<author orcid="0000-0002-5201-1620">Jiacheng Xu</author>
<author>Yuan Tian 0001</author>
<author orcid="0000-0002-1622-213X">Qiuyang Wei</author>
<author orcid="0000-0002-0010-0592">Qinying Wang</author>
<author>Chenyang Lyu</author>
<author>Xuhong Zhang 0002</author>
<author>Changting Lin</author>
<author>Jingzheng Wu</author>
<author>Raheem Beyah</author>
<title>A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.</title>
<pages>442-454</pages>
<year>2022</year>
<booktitle>ISSTA</booktitle>
<ee>https://doi.org/10.1145/3533767.3534366</ee>
<ee>https://www.wikidata.org/entity/Q130909023</ee>
<crossref>conf/issta/2022</crossref>
<url>db/conf/issta/issta2022.html#ZhaoJX0WWL0LWB22</url>
</inproceedings>
</dblp>
