This research was supported in part by the National Natural Science Foundation of China(Grant No.61802394,U1836209);Foundation of Science and Technology on Information Assurance Laboratory(No.KJ-17-110);National Key Research and Development Program of China(2016QY071405);Strategic Priority Research Program of the CAS(XDC02040100,XDC02030200,XDC02020200).
The Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability has been widely exploited by attackers to cause severe damages to computer systems.Automatically identifying this kind of vulnerability is critical for softw...
supported in part by the National Natural Science Foundation of China(Grant No.61802394,U1836209);Foundation of Science and Technology on Information Assurance Laboratory(No.KJ-17-110);National Key Research and Development Program of China(2016QY071405);Strategic Priority Research Program of the CAS(XDC02040100,XDC02030200,XDC02020200).
The Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability has been widely exploited by attackers to cause severe damages to computer systems.Automatically identifying this kind of vulnerability is critical for softw...