Research Article
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression
Figure 1
(a) The memory map of program with 128-byte external input. (b) The memory map of program with 150 “A” as external input.
(a) |
(b) |