Research Article
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression
| Program name | Exception type | Conversion method | Conversion count | Converted type |
| CADET_00001 | Read exception | Gadget | 1 | Execute | CROMU_00055 | Read exception | Self-reference/gadget | 4 | Execute/write-x-where | CROMU_00058 | Read exception | Self-reference/gadget | 1 | Execute/write-x-where | CROMU_00064 | Read exception | Self-reference/gadget | 12 | Execute | CROMU_00078 | Read exception | Gadget | 5 | write-x-where | YAN01_00001 | write-x-where | Gadget | 8 | Execute | LEGIT_00003 | write-x-where | Self-reference/gadget | 1 | Execute | TNETS_00002 | Read exception | Gadget | 5 | Execute | NRFIN_00074 | Read exception | Self-reference/gadget | 3 | Execute | NRFIN_00078 | Read exception | Gadget | 2 | Execute | CROMU_00064 | write-x-where | Gadget | 4 | Execute | Equation_parser_overflow | Read exception | Self-reference/gadget | 1 | Execute |
|
|