Skip to main content

Advertisement

Fig. 4 | Cybersecurity

Fig. 4

From: From proof-of-concept to exploitable

Fig. 4

An example layout-contributor digraph. Assume the object created at line 35 is an exceptional object. It could be indexed by objects created at line 22 and 5 repsectively, and eventually pointed by a global pointer ptr. a sample execution trace, b layout digraph, c layout-contributor

Back to article page