Research Article

A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code

Figure 8

Example of a vulnerability in a source code slice and the corresponded assembly code slice.