Research Article
Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning
| Operation type | Instance |
| Constant | memcpy (dest, src, 256) | Addition | memcpy (dest, src, i+256) | Multiplication | memcpy (dest, src, i8) | Nonlinear | memcpy (dest, src, i%8) | Function call | memcpy (dest, src, f(n)) | Array access | memcpy (dest, src, buf) |
|
|