Fuzzing

Results: 86



#Item
41Deja vu Security™ Converting Peach Pits from Version 2.3 This document outlines the conversion details to update Peach fuzzing definitions (Peach Pits) from the Peach Platform version 2.3 to version 3.x. The changes in

Deja vu Security™ Converting Peach Pits from Version 2.3 This document outlines the conversion details to update Peach fuzzing definitions (Peach Pits) from the Peach Platform version 2.3 to version 3.x. The changes in

Add to Reading List

Source URL: www.peachfuzzer.com

Language: English - Date: 2015-08-04 21:28:31
    42What is Fuzzing: The Poet, the Courier, and the Oracle Fuzzing is well established as an excellent technique for locating vulnerabilities in software. The basic premise is to deliver intentionally malformed input to targ

    What is Fuzzing: The Poet, the Courier, and the Oracle Fuzzing is well established as an excellent technique for locating vulnerabilities in software. The basic premise is to deliver intentionally malformed input to targ

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2016-03-02 04:58:14
      43gFuzz: An instrumented Web application fuzzing environment Ezequiel D. Gutesman Corelabs Core Security Technologies

      gFuzz: An instrumented Web application fuzzing environment Ezequiel D. Gutesman Corelabs Core Security Technologies

      Add to Reading List

      Source URL: archive.hack.lu

      Language: English - Date: 2008-12-03 13:56:20
        44Improving Mac OS X Security Through Gray Box Fuzzing Technique Stefano Bianchi Mazzone Mattia Pagnozzi Aristide Fattori

        Improving Mac OS X Security Through Gray Box Fuzzing Technique Stefano Bianchi Mazzone Mattia Pagnozzi Aristide Fattori

        Add to Reading List

        Source URL: www.iseclab.org

        Language: English
          45Fuzzing Project report June 2015 Hanno Bck June

          Fuzzing Project report June 2015 Hanno Bck June

          Add to Reading List

          Source URL: www.coreinfrastructure.org

          Language: English - Date: 2015-07-08 15:58:14
            46From Blackbox Fuzzing to Whitebox Fuzzing towards Verification

            From Blackbox Fuzzing to Whitebox Fuzzing towards Verification

            Add to Reading List

            Source URL: www.cis.upenn.edu

            Language: English - Date: 2014-10-22 10:00:33
              47Fuzzing the Phone in your Phone

              Fuzzing the Phone in your Phone

              Add to Reading List

              Source URL: www.blackhat.com

              Language: English - Date: 2015-05-28 15:51:51
                48Caiipa: Automated Large-scale Mobile App Testing through Contextual Fuzzing Chieh-Jan Mike Liang‡ , Nicholas D. Lane‡ , Niels Brouwers∗ , Li Zhang? , Börje F. Karlsson‡ , Hao Liu† , Yan Liu/ , Jun Tang./ , Xia

                Caiipa: Automated Large-scale Mobile App Testing through Contextual Fuzzing Chieh-Jan Mike Liang‡ , Nicholas D. Lane‡ , Niels Brouwers∗ , Li Zhang? , Börje F. Karlsson‡ , Hao Liu† , Yan Liu/ , Jun Tang./ , Xia

                Add to Reading List

                Source URL: research.microsoft.com

                Language: English - Date: 2014-08-04 07:13:30
                  49TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection

                  TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection

                  Add to Reading List

                  Source URL: oakland10.cs.virginia.edu

                  Language: English - Date: 2010-05-20 11:30:55
                  50Fuzzing with Code Fragments Christian Holler Mozilla Corporation∗   Kim Herzig

                  Fuzzing with Code Fragments Christian Holler Mozilla Corporation∗ Kim Herzig

                  Add to Reading List

                  Source URL: www.usenix.org

                  Language: English - Date: 2015-06-08 10:10:52