Research Article
A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities
Table 2
Numerical relationship between memory objects.
| Object relation | Relation predicate | Description |
| Equal | EQ(o1, o2/) | o1 equals o2/numeral | Unequal | NE(o1, o2/) | o1 unequals o2/numeral | Greater | GT(o1, o2/) | o1 is greater than o2/numeral | Greater or equal | GE(o1, o2/) | o1 is greater than or equal to o2/numeral | Less | LT(o1, o2/) | o1 is less than o2/numeral | Less or equal | LE(o1, o2/) | o1 is less than or equal to o2/numeral | Meet size | SZ(c, L) | The size of the chunk c lets the requirements of the free list L into the chain |
|
|