vulnerability, binary analysis, reverse engineering, IoT security
vulnerability, binary CFI, control flow integrity, security