Research Article

A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities

Figure 6

Working time for MPC and MPD under different conditions.