体育投注官网

Software Integrity Blog

Archive for the 'Fuzz Testing' Category

 

World’s top hackers meet at the first 5G Cyber Security Hackathon

体育投注官网

Our Defensics R&D team put a couple of Synopsys tools to the test in the 5G Cyber Security Hackathon in Oulu, Finland, and placed in both of their competitions.

Continue Reading...

Posted in Fuzz Testing, Software Composition Analysis (SCA), Software Security Research | Comments Off on World’s top hackers meet at the first 5G Cyber Security Hackathon

 

[Webinars] Automotive fuzz testing and financial services AppSec

体育投注官网

Learn how agent instrumentation improves fuzz testing of automotive IVI and telematics systems, and about financial services application security.

Continue Reading...

Posted in Financial Cyber Security, Fuzz Testing, Webinars | Comments Off on [Webinars] Automotive fuzz testing and financial services AppSec

 

Q&A: Fuzz testing, agent instrumentation, and Defensics

体育投注官网

Do you have questions about fuzz testing? We’ve got answers, explanations, and recommendations from our last webinar on fuzzing using agent instrumentation.

Continue Reading...

Posted in Automotive Cyber Security, Fuzz Testing, Webinars | Comments Off on Q&A: Fuzz testing, agent instrumentation, and Defensics

 

WPA2 encryption bypass: Using Defensics to uncover behavioral vulnerabilities

体育投注官网

We discovered a WPA2 encryption bypass vulnerability (CVE-2018-18907) in a router that allows full access to a WLAN without credentials. The vendor has released a patch for the device.

Continue Reading...

Posted in Fuzz Testing | Comments Off on WPA2 encryption bypass: Using Defensics to uncover behavioral vulnerabilities

 

Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

体育投注官网

This is the second of two articles that describe how to use the Defensics SDK in fuzzing Bitcoin. In the previous article体育投注官网, you saw how to set up a test bed for bitcoind. We created two containers, alice and bob, and were able to set up communication between the two bitcoind instances. In this article, you’ll learn how to create a data model for the Bitcoin network protocol, then use this model in the Defensics SDK to perform fuzzing on bitcoind.

Continue Reading...

Posted in Developer Enablement, Fuzz Testing | Comments Off on Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

 

Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

体育投注官网

This is the first of two articles that describe how to use the Defensics SDK to fuzz体育投注官网 Bitcoin software. Specifically, you will learn how to model one of the Bitcoin protocol messages and use the Defensics SDK to perform fuzzing on the bitcoind process.

Continue Reading...

Posted in Fuzz Testing | Comments Off on Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

 

How to break car kits with Bluetooth fuzz testing

体育投注官网

How do you find vulnerabilities and issues in Bluetooth-enabled devices? One of our favorite methods is fuzzing. Learn how to fuzz test Bluetooth car kits.

Continue Reading...

Posted in Automotive Cyber Security, Fuzz Testing | Comments Off on How to break car kits with Bluetooth fuzz testing

 

Debunking the top 5 Defensics fuzz testing myths

体育投注官网

Written in coordination with Chris Clark, Defensics product manager

Continue Reading...

Posted in Fuzz Testing | Comments Off on Debunking the top 5 Defensics fuzz testing myths

 

Navigating responsible vulnerability disclosure best practices

体育投注官网

The definition of responsible vulnerability disclosure varies based on who you ask. Tech goliath Microsoft has openly disagreed with Google on this very topic, as .

Continue Reading...

Posted in Fuzz Testing, Software Architecture & Design | Comments Off on Navigating responsible vulnerability disclosure best practices

 

How to proactively protect IoT devices from DDoS attacks

体育投注官网

Ensure that your business-critical software is resilient enough to withstand DDoS attacks and that your IoT devices’ attack surfaces are hardened.

Continue Reading...

Posted in Fuzz Testing | Comments Off on How to proactively protect IoT devices from DDoS attacks