which we used for: (1) benchmarking vulnerability detection tools
allowing a baseline comparison between them; (2) identifying some vulnerabilities that are commonly ignored by such tools. The goal of the presentation is describe the database construction strategy