Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Table 4

The conversion results of using different crashes.

OrderCrash_addrOriginal_typeConvert_countFinal_addrFinal_typeExploit-able

(1)0x804f6b1Read_violation20x804f6cfExitNo
(2)0x804ca79Read_violation70x804cdd8Write violationYes
(3)0x804fbeeRead_violation40x804f710Write violationNo
(4)0x804fb1eRead_violation40x804cdf7Write violationNo
(5)0x804cb49Read_violation30x804cb00ExitNo