Research Article

A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities

Table 6

Overall results of RELAY.

NameCTFVul typeExp. patternNmLpDcTm/sRevery

Successful casesBRHG-13BRHGUAFfast_bin_exp65381283
pwn14DEFCON China&BCTFHeap overflowhof_exp8432927
pwn40DEFCON China&BCTFHeap overflowunlink_exp55431194
note2ZCTF 2016Heap overflowunlink_exp1810831427
note3ZCTF 2016Heap overflowunlink_exp1912741483
fbAliCTF 2016Heap overflowunlink_exp3213961638
StkofHITCON 2014Heap overflowunlink_exp27121171829
Simple noteTokyo westerns 2017Off-by-oneunlink_exp2110991595
Search engine2015 9447 CTFDouble freefast_bin_exp21131061762
BadintDefcon qualifier 2017Heap overflowfast_bin_exp31131382053
WeqponDelta Ctf 2019UAFfast_bin_exp2412821518
Babyheap0ctf 2017Heap overflowoverlap_exp36161752431
PwnmeNCTF2019Off-by-oneoverlap_exp25151522218
Bcloud2016 BCTFHeap overflowhof_exp139751364
Gyctf2020_forceBUUCTFHeap overflowhof_exp168861487
BambooboxHitcon trainingHeap overflowhof_exp128691329

Failed casesBookstore2015 hackluHeap overflowunlink_exp2510126
Babyheap0ctf2018Off-by-oneoverlap_exp2113153
Wheelofrobots2017 insomni’hackOff-by-oneoverlap_exp1811141
BabypwnN1ctf2019Double freefastbin_exp2311148