Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Figure 11

Each exception node maintaining its own level and available data gadget list.