Research Article

[Retracted] Detection and Analysis of Man-Machine Interactive Software Vulnerabilities Based on Ultrasonic Data Acquisition and Signal Processing Algorithms

Table 2

The number of suspicious instructions and the accuracy of their type information.

Program nameSizeInteger overflowSymbol errorAssignment truncationTotalAccuracy of type information (%)

slocate-2.746.3 K5/61/11/18/8100
zgv-5.8284.4 K22/2418/1816/1658/5998.3
Python-2.5.23.1 M94/9622/2261/67177/18496.2
ngiRCd-0.8.1329.5 K13/1713/1318/1946/4993.9
OpenSSH-2.2.1150.2 K13/151/19/924/2596
mpg123-1.7.11.02 M6/84/41/112/1392.3
rdesktop-1.5.0562.7 K2/21/10/03/3100

Note. x/y: y represents the number of suspicious instructions, and x represents the number of instructions with correct type information.