Research Article
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression
Table 5
Experiment results of our approach and AFL method only.
| Program name | AFL First AV | AFL First EV | AFL + Method First converted EV | Convert time | Successful cases | Failed cases |
| CADET—00001 | 15′′ | 19′′ | 24′′ | 9′′ | 2 | 1 | CROMU_00055 | 9′′ | 29′51′′ | 32′′ | 23′′ | 3 | 1 | CROMU_00058 | 10′′ | / | 45′′ | 35′′ | 1 | 2 | CROMU_00064 | 7′′ | 9′44′′ | 53′′ | 46′′ | 2 | 0 | CROMU_00078 | 54′′ | / | 2′15′′ | 1′21′′ | 1 | 0 | YAN01_00001 | 6′52′′ | 6′38′′ | 7′40′′ | 48′′ | 1 | 1 | LEGIT_00003 | 3′′ | 2′27′′ | 21′′ | 18′′ | 1 | 0 | TNETS_0002 | 7′′ | 13′′ | 39′′ | 32′′ | 1 | 1 | NRFIN_00074 | 14′′ | / | 1′24′′ | 1′10′′ | 1 | 0 | NRFIN_00078 | 2′′ | 2′22′′ | 58′′ | 56′′ | 1 | 1 | Equation_parser_overflow | 9′′ | / | 37′′ | 28′′ | 1 | 1 | NRFIN_00059 | 34′′ | / | / | 27′41′′ | 0 | 6 | KPRCA_00065 | 32′′ | 36′′ | / | 4′11′′ | 0 | 3 |
|
|