With results of the traces we should be able to determine which category of bug it is. A classifier needs to match function calls and parameters, then output appropriate Tags. e.g.
- str_replace = FilterStrReplace
- mysql_real_escape = SqlEscape
- stat/open = LocalFile
- system = CmdExecution
- connect/send = Network
This fits into the project because it will form the basis of the analyser and exploiter in the level above, e.g. 'LocalFile+CodeExecution' - RCE. The tags will be used to determine what modifications to make to the input parameters to verify the level of control over them, see if there's filtering etc.