Table 1. Detection rules of LLVM instructions for exploitable program state.