News

Abstract: In recent years, control flow graphs (CFGs) have gained increasing prominence in binary vulnerability detection due to their comprehensive representation of a program's execution paths.