Fig. 5From: Memory access integrity: detecting fine-grained memory access errors in binary codeMemory ranges in the linked list exampleBack to article page