Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Figure 1

(a) The memory map of program with 128-byte external input. (b) The memory map of program with 150 “A” as external input.
(a)
(b)