Research Article
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression
Algorithm 2
Make symbolic trace
consistent with real trace
.(1) Input: real trace | (2) Output: None | (3) while ! = : | (4) If is_hooked(current_addr) | (5) while addr_in_plt(): | (6) Bb += 1 | (7) = − | (8) = the address after symbolic execution with step size | (9) endwhile | (10) End |
|