Research Article
A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities
Table 5
Typical mapping relation for a heap allocator.
| |||||||||||||||||||||||||||||||||||||||||
A, allocation; , deallocation; reallocation can be regarded as one of these. The allocator needs to check and again after checking the previous 5 conditions. |