Check Point security researchers have developed a new “fingerprinting”” technique to find the developer of a Windows exploit. The method involves looking for uncommon source code identifiers that can be associated with a specific exploit writer such as unique artifacts (such as strings
Source: code snippets