related documents Vestige: Identifying Binary Code Provenance for Vulnerability Detection Conference Paper