each application has up to two files. One for memory dataset and another for control flow dataset. Each dataset is composed of JSON objects. Each instruction is a JSON object.

Dataset Files

You must be an IEEE Dataport Subscriber to access these files. Subscribe now or login.

[1] Ayman Youssef, "Runtime traces of buffer overflow exploitation", IEEE Dataport, 2023. [Online]. Available: http://dx.doi.org/10.21227/q4zc-td75. Accessed: Jun. 16, 2024.
@data{q4zc-td75-23,
doi = {10.21227/q4zc-td75},
url = {http://dx.doi.org/10.21227/q4zc-td75},
author = {Ayman Youssef },
publisher = {IEEE Dataport},
title = {Runtime traces of buffer overflow exploitation},
year = {2023} }
TY - DATA
T1 - Runtime traces of buffer overflow exploitation
AU - Ayman Youssef
PY - 2023
PB - IEEE Dataport
UR - 10.21227/q4zc-td75
ER -
Ayman Youssef. (2023). Runtime traces of buffer overflow exploitation. IEEE Dataport. http://dx.doi.org/10.21227/q4zc-td75
Ayman Youssef, 2023. Runtime traces of buffer overflow exploitation. Available at: http://dx.doi.org/10.21227/q4zc-td75.
Ayman Youssef. (2023). "Runtime traces of buffer overflow exploitation." Web.
1. Ayman Youssef. Runtime traces of buffer overflow exploitation [Internet]. IEEE Dataport; 2023. Available from : http://dx.doi.org/10.21227/q4zc-td75
Ayman Youssef. "Runtime traces of buffer overflow exploitation." doi: 10.21227/q4zc-td75