Research Article

Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning

Figure 8

Comparison between our method and Joern. (a) Comparison of average confusion matrix. (b) Comparison of average recall, TNR, precision, and .
(a)
(b)