Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Figure 2

(a) The memory layout of program with 150 “A” as external input. (b) The memory layout of program with constructed data that can suppress read exception as external input.
(a)
(b)