Memory corruption is most (90%) of vulnerabilities
A computer program at a high level can be seen as a logical predicate describing all of its permitted behaviors. However, under memory corruption exploits, predicates could disappear, and the program merely becomes a Turing machine.
Attack Model
- Difference steps exploiting memory chain