Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Table 1

Experimental results.

Program nameException typeConversion methodConversion countConverted type

CADET_00001Read exceptionGadget1Execute
CROMU_00055Read exceptionSelf-reference/gadget4Execute/write-x-where
CROMU_00058Read exceptionSelf-reference/gadget1Execute/write-x-where
CROMU_00064Read exceptionSelf-reference/gadget12Execute
CROMU_00078Read exceptionGadget5write-x-where
YAN01_00001write-x-whereGadget8Execute
LEGIT_00003write-x-whereSelf-reference/gadget1Execute
TNETS_00002Read exceptionGadget5Execute
NRFIN_00074Read exceptionSelf-reference/gadget3Execute
NRFIN_00078Read exceptionGadget2Execute
CROMU_00064write-x-whereGadget4Execute
Equation_parser_overflowRead exceptionSelf-reference/gadget1Execute