Research Article
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression
Table 4
The conversion results of using different crashes.
| Order | Crash_addr | Original_type | Convert_count | Final_addr | Final_type | Exploit-able |
| (1) | 0x804f6b1 | Read_violation | 2 | 0x804f6cf | Exit | No | (2) | 0x804ca79 | Read_violation | 7 | 0x804cdd8 | Write violation | Yes | (3) | 0x804fbee | Read_violation | 4 | 0x804f710 | Write violation | No | (4) | 0x804fb1e | Read_violation | 4 | 0x804cdf7 | Write violation | No | (5) | 0x804cb49 | Read_violation | 3 | 0x804cb00 | Exit | No |
|
|