Research Article

A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter

Figure 7

The data structure for the JCFG node attribute.