Fuzzing: Runtime Bug Hunting | Synopsys
Dr. Jared DeMott of VDA Labs continues the series on bug elimination with a discussion of negative input testing or what's called fuzz testing. By creating malformed input, the fuzz test can identify the moment when software crashes or otherwise produces unexpected results. Covered in this talk are mutation, generational, and feedback fuzz testing.
Видео Fuzzing: Runtime Bug Hunting | Synopsys канала Synopsys
Видео Fuzzing: Runtime Bug Hunting | Synopsys канала Synopsys
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Going Beyond Coverage-Guided Fuzzing with Structured FuzzingSoftware Composition Analysis: Check Assembled Product For Known Risks | SynopsysBlack Duck Software Composition Analysis | SynopsysProgram-Adaptive Mutational FuzzingFuzzing (fuzz testing) 101: Lessons from cyber security expert Dr. David BrumleyNDSS 2017: VUzzer: Application-aware Evolutionary Fuzzing2017 LLVM Developers’ Meeting: K. Serebryany “Structure-aware fuzzing for Clang and LLVM with ...”An Inside Look: Vaishnavi, ASIC Digital Design Engineer | Synopsys36C3 - No source, no problem! High speed binary fuzzingClusterFuzz: Fuzzing at Google ScaleC++ Weekly - Ep 85 - Fuzz TestingAn Inside Look: Yanjun, A&MS Layout Design | SynopsysF-Secure Labs Fuzzing C ProgramsFinding Bugs with Coverage Guided Fuzz Testing (DevSecOps)Defensics Fuzz Testing | SynopsysFull speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided TracingOffensiveCon19 - Andrey Konovalov - Coverage-Guided USB Fuzzing with SyzkallerGTAC 2016: Finding Bugs in C++ Libraries Using LibFuzzerLife of an Exploit: Fuzzing PDFCrack with AFL for 0days