Fig. 3From: Memory access integrity: detecting fine-grained memory access errors in binary codeAn overview of the workflow of MAIBack to article page