Runtime traces of buffer overflow exploitation

Citation Author(s):
Ayman
Youssef
Deakin University
Submitted by:
Ayman Youssef
Last updated:
Fri, 01/13/2023 - 00:51
DOI:
10.21227/q4zc-td75
Data Format:
Research Article Link:
License:
194 Views
Categories:
Keywords:
0
0 ratings - Please login to submit your rating.

Abstract 

each application has up to two files. One for memory dataset and another for control flow dataset. Each dataset is composed of JSON objects. Each instruction is a JSON object.

Comments

some apps didn't have control flow traces and were only limited to memory.

Submitted by Ayman Youssef on Fri, 01/13/2023 - 00:51