Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Table 3

Exception nodes in suppression process.

Node seriesNode addressNode type

(1)0x804ce57Read violation
(2)0x804ca79Read violation
(3)0x804ca85Read violation
(4)0x804d08dRead violation
(5)0x804f710Write violation