Research Article

Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning

Figure 5

Simplified CPG of code for Algorithm 3.