Fig. 13From: Memory access integrity: detecting fine-grained memory access errors in binary codeNetatalk vulnerable codeBack to article page