Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Program 1

A simple program containing read exception vulnerability.
(1)  char message = Hello World!;
(2) void vulnerable_function()
(3) char tmp;
(4) tmp = message;
(5) char buff[128];
(6) read(0,buf,256);
(7) printf(%s,tmp); //The location read exception occur
(8) printf(You have passed successfully!);
(9) }