Fuzz testing

Results: 121



#Item
71Microsoft Windows / Windows NT / Fuzz testing / Windows API / Architecture of Windows NT / Windows / Crash / X Window System / Operating system / Software / Computing / System software

July 27, 2000 Page 1 An Empirical Study of the Robustness of Windows NT Applications Using Random Testing

Add to Reading List

Source URL: ftp.cs.wisc.edu

Language: English - Date: 2005-12-02 13:12:18
72Computing / Software engineering / Temporal logic / Assertion / Debugging / Fuzz testing / Model checking / Computation tree logic / Java Modeling Language / Software testing / Logic in computer science / Theoretical computer science

Advanced Topics in Combinatorial Methods for Testing

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-04 15:52:31
73Cyberwarfare / Fault injection / Vulnerability / Software assurance / Computer virus / Software quality / Fuzz testing / Application security / Data & Analysis Center for Software / Software testing / Computer security / Security

I N S T I T U T E F O R D E F E N S E A N A LYS E S State-of-the-Art Resources (SOAR) for Software Vulnerability Detection, Test, and Evaluation

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-08-11 16:06:02
74Debuggers / Debugging / Breakpoint / Assemblers / Software testing / Hooking / Fuzz testing / DLL injection / Debug / Computer programming / Computing / Software engineering

INDEX A C access violation handlers, 60

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2012-02-08 15:24:21
75Computing / Application security / Attack surface / Threat model / Vulnerability / Secure coding / Fuzz testing / Computer security / Cyberwarfare / Software testing

presented by Hardening the UEFI Attack Surface Updated[removed]

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-24 15:13:25
76Fuzz testing / Oulu University Secure Programming Group / Minneapolis / Geography of Minnesota / Computing / Minnesota / Software testing / Computer network security / Codenomicon

Cyber threat identification An Inconvenient truth MIKKO VARPIOLA Co-Founder, Codenomicon Ltd. http://www.codenomicon.com/

Add to Reading List

Source URL: www.cybersecuritysummit.org

Language: English - Date: 2013-06-06 16:40:22
77Cyberwarfare / Codenomicon / Software quality / Fuzz testing / Penetration test / Vulnerability / Fault injection / Mutation testing / Software testing / Computer network security / Computer security

DEFEND. THEN DEPLOY. for Penetration testing The purpose of penetration testing is to see whether it is possible to gain access into a system by trying out various attack scenarios. Penetration testing is still largely

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2010-08-31 06:36:34
78Evaluation / Fuzz testing / Oulu University Secure Programming Group / Robustness testing / Prototype / Black-box testing / Test data / Statistical hypothesis testing / Reliability engineering / Software testing / Statistics / Software quality

Experiences with Model Inference Assisted Fuzzing Joachim Viide, Aki Helin, Marko Laakso, Pekka Pietik¨ainen Mika Sepp¨anen, Kimmo Halunen, Rauli Puuper¨a, Juha R¨oning University of Oulu, Computer Engineering Labora

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2008-07-15 18:26:53
79Test case / Robustness testing / Computing / Business / Technology / Fault injection / Software testing / Codenomicon / Fuzz testing

DEFEND. THEN DEPLOY[removed]ECOND 8000

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2011-11-01 08:33:50
80Cyberwarfare / Fuzz testing / Codenomicon / Black-box testing / Vulnerability / Software bug / Fault injection / Software testing / Computer security / Software quality

Fuzzing Practical Considerations Of Fuzzing: Generating Insight into Areas of Risk Jonathan Knudsen

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2014-06-04 06:04:31
UPDATE