Fig. 8From: ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysisSample code for illustrating potential IO2BO vulnerabilities identificationBack to article page