Resolving input validation vulnerabilities by retracing taint flow through source code | IEEE Conference Publication | IEEE Xplore