Fuzz testing

Results: 121



#Item
21SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2015; 00:1–30 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: stvr Cause reduction: delta debugging, even wit

SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2015; 00:1–30 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: stvr Cause reduction: delta debugging, even wit

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2015-04-28 14:41:47
22TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection

Add to Reading List

Source URL: oakland10.cs.virginia.edu

Language: English - Date: 2010-05-20 11:30:55
23Kinematic Analysis of a Space Mechanism—Rendezvous Simulator

Kinematic Analysis of a Space Mechanism—Rendezvous Simulator

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2014-01-30 00:13:52
24Billions and Billions of Constraints: Whitebox Fuzz Testing in Production Ella Bounimova Patrice Godefroid

Billions and Billions of Constraints: Whitebox Fuzz Testing in Production Ella Bounimova Patrice Godefroid

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-03-15 15:23:34
25Symbolic Execution for Software Testing in Practice – Preliminary Assessment Imperial College London Microsoft Research

Symbolic Execution for Software Testing in Practice – Preliminary Assessment Imperial College London Microsoft Research

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-04-25 20:08:55
26Fuzzing with Code Fragments Christian Holler Mozilla Corporation∗   Kim Herzig

Fuzzing with Code Fragments Christian Holler Mozilla Corporation∗ Kim Herzig

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-06-08 10:10:52
27CHAPTER  26 System Evaluation and Assurance If it’s provably secure, it probably isn’t.

CHAPTER 26 System Evaluation and Assurance If it’s provably secure, it probably isn’t.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:56:48
28Reference table from Section 2a of Practical Security Stories and Security Tasks for Agile Development Environments www.safecode.org/publications/ SAFECode_Agile_Dev_Security0712.pdf

Reference table from Section 2a of Practical Security Stories and Security Tasks for Agile Development Environments www.safecode.org/publications/ SAFECode_Agile_Dev_Security0712.pdf

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:15
291 Vulnerability finding in Win32 – a comparison There are several well known techniques to find a vulnerability in a closed source product running on the Windows family of operating systems. Researchers tend to prefer

1 Vulnerability finding in Win32 – a comparison There are several well known techniques to find a vulnerability in a closed source product running on the Windows family of operating systems. Researchers tend to prefer

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
30Combining McCabe IQ with Fuzz Testing Combining McCabe IQ with Fuzz Testing  Introduction

Combining McCabe IQ with Fuzz Testing Combining McCabe IQ with Fuzz Testing Introduction

Add to Reading List

Source URL: www.mccabe.com

Language: English - Date: 2008-12-09 09:26:35