Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Figure 15

Suppression of Equation_parser_overflow.