Research Article

A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities

Figure 4

Constructing the MOP graph and extracting the MOG from it. The circles and lines represent the nodes and edges of the MOP graph, respectively. The blue line represents the strengthened edge. The dotted line represents the traversal path . The number represents the weight of the edge called driving cost (explained later). (a) Mark nodes and edges in CFG; (b) build MOP graph; (c) extract MOG from MOP graph.
(a)
(b)
(c)