Skip to the content.

Proof-of-Concept (PoC) Research Papers

Contributions Welcome License

Recent papers related to Proof-of-Concept (PoC) including exploit generation, empirical analysis, and applications. Feel free to make contributions to this repository (e.g., adding new papers) by creating pull requests.

Contents

2025 2024 2023 2022 2021 2020 2019 2018 2017 2016 and Before
PoC Analysis and Empirical Studies PoC Generation PoC Applications Preprints

All Papers

2025

NDSS

PLDI

ASE

USENIX Security

2024

S&P

NDSS

USENIX Security

ICSE

2023

S&P

ISSTA

NDSS

2022

CCS

USENIX Security

2021

CCS

USENIX Security

TDSC

ICSE

ICPC

2020

USENIX Security

2019

USENIX Security

CCS

2018

CCS

USENIX Security

2017

CCS

2016 and Before

SIGKDD ‘10

NDSS ‘11

S&P ‘08


Papers by Topic

PoC Analysis and Empirical Studies

Empirical studies, surveys, and measurements analyzing PoC exploits, bug reports, and vulnerability characteristics.

Exploit Reproducibility


PoC Generation

Automated techniques for generating proof-of-concept exploits using fuzzing, symbolic execution, and program analysis.

Fuzzing-Based Generation

Symbolic Execution and Constraint Solving

Program Analysis and Automation

PoC Applications

Applications of PoC exploits in vulnerability assessment, exploit prediction, migration, and bug reproduction.

Vulnerability Assessment and Exploitability Prediction

PoC Migration and Transformation

Bug Reproduction


Preprints


Contributing

Contributions are welcome:

License

This documentation is licensed under CC BY 4.0. Individual papers retain their original copyrights.