Runtime traces of buffer overflow exploitation

Citation Author(s):
Ayman
Youssef
Deakin University
Submitted by:
Ayman Youssef
Last updated:
Fri, 01/13/2023 - 00:51
DOI:
10.21227/q4zc-td75
Data Format:
Research Article Link:
License:
200 Views
Categories:
Keywords:
0
0 ratings - Please login to submit your rating.

Abstract 

each application has up to two files. One for memory dataset and another for control flow dataset. Each dataset is composed of JSON objects. Each instruction is a JSON object.

Instructions: 

as stated above, each app has up to two text files, each line in each file is a JSON object representing a single instruciton. Please refer to published paper for more details.

Comments

some apps didn't have control flow traces and were only limited to memory.

Submitted by Ayman Youssef on Fri, 01/13/2023 - 00:51