[Retracted] Detection and Analysis of Man-Machine Interactive Software Vulnerabilities Based on Ultrasonic Data Acquisition and Signal Processing Algorithms
Table 2
The number of suspicious instructions and the accuracy of their type information.
Program name
Size
Integer overflow
Symbol error
Assignment truncation
Total
Accuracy of type information (%)
slocate-2.7
46.3 K
5/6
1/1
1/1
8/8
100
zgv-5.8
284.4 K
22/24
18/18
16/16
58/59
98.3
Python-2.5.2
3.1 M
94/96
22/22
61/67
177/184
96.2
ngiRCd-0.8.1
329.5 K
13/17
13/13
18/19
46/49
93.9
OpenSSH-2.2.1
150.2 K
13/15
1/1
9/9
24/25
96
mpg123-1.7.1
1.02 M
6/8
4/4
1/1
12/13
92.3
rdesktop-1.5.0
562.7 K
2/2
1/1
0/0
3/3
100
Note. x/y: y represents the number of suspicious instructions, and x represents the number of instructions with correct type information.