Research Article

Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning

Figure 4

Schematic representation of CPG.
(a)
(b)