Runtime traces of buffer overflow exploitation each application has up to two files. One for memory dataset and another for control flow dataset. Each dataset is composed of JSON objects. Each instruction is a JSON object. Categories: Machine Learning Security