Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Figure 8

Suppressing exception by replacing violate address with valid address.