Fuzz testing

Results: 121



#Item
31Security / Software quality / Crime prevention / National security / Fuzz testing / Computer security / Penetration test / Software assurance / Agile software development / Software testing / Computer network security / Software development

Reference table from Section 3 of Practical Security Stories and Security Tasks for Agile Development Environments www.safecode.org/publications/ SAFECode_Agile_Dev_Security0712.pdf

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:17
32Software engineering / Evaluation / Codenomicon / Fault injection / Software testing / Software quality / Fuzz testing

Fuzzing Daniel Bas´aez S. January 22, 2009

Add to Reading List

Source URL: www.verifysoft.com

Language: English - Date: 2011-01-03 03:00:55
33Audio codecs / Vorbis / Ogg / Fuzz testing / Digital container format / Theora / Codec / Computing / Computer file formats / Data

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
34Computer security / Fuzz testing / Norton AntiVirus / Rootkit / Malware / Computer virus / Avast! / ESET NOD32 / Vulnerability / Antivirus software / Software / System software

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
35Software / Test automation / Fuzz testing / Unit testing / Usability testing / Rex Black / Agile software development / Book:Software testing / Software testing / Software development / Evaluation

PDF Document

Add to Reading List

Source URL: karennicolejohnson.com

Language: English - Date: 2014-06-03 00:38:24
36Cyberwarfare / Software quality / Fuzz testing / Hacking / Vulnerability / Buffer overflow / Uncontrolled format string / Computer network security / Software testing / Computer security / Software bugs

Software Vulnerability • Refers to a weakness in a system allowing an attacker to violate the integrity, confidentiality, access control, availability, consistency or audit mechanism of the system or the data and appl

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
37Data / Internet standards / Email / Fuzz testing / Internet protocols / Data transmission / File Transfer Protocol / Transmission Control Protocol / Communications protocol / Computing / Internet / Software testing

Fuzzing Frameworks Pedram Amini <> Introduction There are a number of available specialized fuzzing utilities which target many common and documented network protocols and file formats. These fuzzers ex

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
38Software quality / Fuzz testing / Genetic algorithm / Session / Fitness function / Access token / Fitness landscape / Communications protocol / Code coverage / Software testing / Computing / Software engineering

Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared D. DeMott Computer Science Michigan State University

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
39Computer security / Penetration test / Vulnerability / Fuzz testing / Security testing / European Telecommunications Standards Institute / Application security / Load testing / Black-box testing / Software testing / Evaluation / Software quality

TRV1Methods for Testing and Specification (MTS); Security Testing; Basic Terminology

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-03-27 04:39:45
40Quality assurance / Codenomicon / Thought / Ethics / Business / Fault injection / Software testing / Fuzz testing / Robustness testing

Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared DeMott Dr. Richard Enbody @msu.edu Dr. William Punch

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
UPDATE