Research Article
A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities
Table 3
Structural relationship between memory objects.
| Object relation | Relation predicate | Description |
| Subordinate | IN(o1, o2) | o1 belongs to o2 | Pointer | PT(o1, o2) | o1 pointer to o2 | Equivalence | IS(o1, o2) | o1 is same to o2 | Higher | HT(o1, o2) | o1 is higher than o2 | Lower | BT(o1, o2) | o1 is lower than o2 | Forward | FD(o1, o2) | o1 is front of o2 | Backward | BK(o1, o2) | o1 is behind o2 | Overlap | LAP(o1, o2) | o1 and o2 have the same memory mem |
|
|