Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Figure 10

The constructed continuously self-referential multilevel linked List.