Fig. 6From: Bin2vec: learning representations of binary executable programs for security tasksExperimental results for vulnerability discovery on the Juliet test suiteBack to article page