Hi,thanks for your remarkable study.
when i read
Table V shows 16 vulnerabilities (CVEs) we use to search in the firmware images. We focus on the CVEs of OpenSSL and BusyBox, as they are widely included in the firmware. For each CVE, we compile the corresponding vulnerable functions in the specified library version and computes the vulnerable function embeddings via TREX.
I wonder how to compile the corresponding vulnerable functions?