Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Table 2

Comparison between our method and existing tools (“√”—Exploitable “”—Probably Exploitable “×”—Unexploitable “?”—Unkonwn).

Program NameException type!exploitableCERT Triage ToolsCRAXREXOur method

CADET_00001Read exception?××
CROMU_00055Read exception??××
CROMU_00058Read exception?××
CROMU_00064Read exception××
CROMU_00078Read exception??××
YAN01_00001write-x-where??××
LEGIT_00003write-x-where?×
TNETS_00002Read exception??××
NRFIN_00074Read exception??××
NRFIN_00078Read exception??××
CROMU_00064write-x-where??××
Equation_parser_overflowRead exception?××
NRFIN_00059Read exception??×××
KPRCA_00065Read exception??×××