Research Article
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression
Figure 2
(a) The memory layout of program with 150 “A” as external input. (b) The memory layout of program with constructed data that can suppress read exception as external input.
(a) |
(b) |