Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Table 5

Experiment results of our approach and AFL method only.

Program nameAFL
First AV
AFL
First EV
AFL + Method
First converted EV
Convert time Successful casesFailed cases

CADET—0000115′′19′′24′′9′′21
CROMU_000559′′29′51′′32′′23′′31
CROMU_0005810′′/45′′35′′12
CROMU_000647′′9′44′′53′′46′′20
CROMU_0007854′′/2′15′′1′21′′10
YAN01_000016′52′′6′38′′7′40′′48′′11
LEGIT_000033′′2′27′′21′′18′′10
TNETS_00027′′13′′39′′32′′11
NRFIN_0007414′′/1′24′′1′10′′10
NRFIN_000782′′2′22′′58′′56′′11
Equation_parser_overflow9′′/37′′28′′11
NRFIN_0005934′′//27′41′′06
KPRCA_0006532′′36′′/4′11′′03