Research Article

Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning

Table 5

Length type.

Operation typeInstance

Constantmemcpy (dest, src, 256)
Additionmemcpy (dest, src, i+256)
Multiplicationmemcpy (dest, src, i8)
Nonlinearmemcpy (dest, src, i%8)
Function callmemcpy (dest, src, f(n))
Array accessmemcpy (dest, src, buf)