Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Algorithm 2

Make symbolic trace consistent with real trace .
(1) Input: real trace
(2) Output: None
(3) while ! = :
(4)  If is_hooked(current_addr)
(5)   while addr_in_plt():
(6)    Bb += 1
(7)   =
(8)   = the address after symbolic execution with step size
(9)  endwhile
(10) End