Research Article

A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code

Figure 2

Workflow of the vulnerability detection system.