A Clairvoyant Approach to Evaluating Software (In)Security | Conference Paper individual record