| CPC G06F 21/577 (2013.01) [G06F 21/568 (2013.01)] | 20 Claims | 

| 
               1. A computer-implemented method comprising: 
            generating application traces using fuzzing for an application with a known security vulnerability, wherein the application traces include good traces that do not result in exploitation of the known security vulnerability and bad traces that result in exploitation of the known security vulnerability; 
                identifying code segments that are executed by the bad traces and not executed by the good traces; and 
                modifying the identified code segments using binary rewriting. 
               |