Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Figure 7

Automatic correction of path divergence. (The trace of concrete execution is on the left; the trace of symbolic execution is on the right.)