Figure 3
From: Vulnerability-oriented directed fuzzing for binary programs

Example of nodes with different execution frequencies.
From: Vulnerability-oriented directed fuzzing for binary programs

Example of nodes with different execution frequencies.