Software Integrity Blog

Archive for the 'Fuzz Testing' Category

 

The ins and outs of fuzz testing with Defensics: Q&A

In our webinar, we talked about preparing for zero-day attacks using fuzz testing, as well as Defensics system compatibility, fuzzing techniques, and more.

Continue Reading...

Posted in Fuzz Testing, Webinars

 

How to Cyber Security: Fuzz a tank

With the Defensics SDK, you can create fuzzing test suites for any type of data. In this article, we demonstrate how to start modeling a custom protocol.

Continue Reading...

Posted in Featured, Fuzz Testing

 

Find more bugs by detecting failure better: An introduction to SanitizerProcessMonitorAgent

By helping your fuzzer detect failure better with agent instrumentation, you can maximize the value of fuzz testing in your secure development life cycle.

Continue Reading...

Posted in Fuzz Testing

 

[Webinar] Instrumentation techniques for fuzz testing

Learn more about fuzzing instrumentation techniques, ranging from simple black box approaches to deeper types that can detect subtler failure modes.

Continue Reading...

Posted in Fuzz Testing, Webinars

 

[Webinars] Fuzz testing, DevOps with Red Hat, and ISO/SAE 21434

Learn about the ins and outs of fuzzing, how to secure your DevOps pipeline with Synopsys and Red Hat, and what ISO/SAE 21434 means for automotive security.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Automotive Cyber Security, Fuzz Testing, Webinars

 

How to Cyber Security: Fuzzing does not mean random

The most efficient fuzzing happens not with random test cases but with targeted test cases generated from detailed data models and a powerful anomalizer.

Continue Reading...

Posted in Fuzz Testing

 

How 5G and IoT devices open up the attack surface on enterprises

As 5G standards continue to evolve, what steps can development organizations take now to improve the security of billions of 5G and IoT devices and systems?

Continue Reading...

Posted in Fuzz Testing, IoT Security

 

Uncover SweynTooth vulnerabilities with Defensics fuzz testing

SweynTooth is a set of Bluetooth Low Energy vulnerabilities. We can reproduce many of these vulnerabilities using Defensics Bluetooth LE Test Suites.

Continue Reading...

Posted in Fuzz Testing, IoT Security, Medical Device Security

 

5G: Vast potential, but better security needed

5G security is top of mind for those who recognize that 5G is going to be higher risk. Fuzzing is one of the leading testing techniques for securing 5G.

Continue Reading...

Posted in Fuzz Testing, IoT Security, Mobile App Security

 

World’s top hackers meet at the first 5G Cyber Security Hackathon

Our Defensics R&D team put a couple of Synopsys tools to the test in the 5G Cyber Security Hackathon in Oulu, Finland, and placed in both of their competitions.

Continue Reading...

Posted in Fuzz Testing, Software Composition Analysis (SCA), Software Security Research