Research Article

Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning

Table 4

Address type.

Operation typeInstance

Constantnot appliable
Additionp(i+8), p(i-8)
Multiplication(p+i8), p(i/8), p(i>>8), p(i<<8)
Nonlinear(p+i%8), (p+pow(i, j)), (p+sqrt(i))
Function call(p+f(i)), (getAddress())
Array access(p+buf[i])