Runtime traces of buffer overflow exploitation

- Citation Author(s):
- Submitted by:
- Ayman Youssef
- Last updated:
- DOI:
- 10.21227/q4zc-td75
- Data Format:
- Research Article Link:
- Categories:
- Keywords:
Abstract
each application has up to two files. One for memory dataset and another for control flow dataset. Each dataset is composed of JSON objects. Each instruction is a JSON object.
Instructions:
as stated above, each app has up to two text files, each line in each file is a JSON object representing a single instruciton. Please refer to published paper for more details.
.