Fig. 17From: Memory access integrity: detecting fine-grained memory access errors in binary codeThe second method of initializing arraysBack to article page