Table 2. Experimental results of identifying exploitable objects by fuzzer.