Back to Results
First PageMeta Content
Cyberwarfare / Computing / Fuzz testing / Codenomicon / Vulnerability / Threat model / Beyond Security / Application security / Black-box testing / Software testing / Computer network security / Computer security


Microsoft Word - softScheck Pohl Cost-Effective Identification of Vulnerabilities with Threat Modeling and Fuzzing Teil für Dec
Add to Reading List

Document Date: 2013-06-04 07:59:30


Open Document

File Size: 291,36 KB

Share Result on Facebook

City

Amsterdam / Reading / New York / /

Company

Bug-Free Software / /

/

Facility

National Institute of Standards and Technology / /

IndustryTerm

appropriate tools / remote server / classic testing technologies / short software life cycles / web applications / securitty-related software / der heimlichen Online-Durchsuchung / software bugs / eve er shorter software / software security / web browsers / web applica ations / web browser protocols / dev veloping mo ore secure software / individual software / software developers / software developing / matic search / software developer / software reviews / Network-based applications / network protocols / software tests / software development / target applications / /

Organization

National Institute of Standards and Technology / Ministry for Educa / /

Person

Hartmut Pohl Geschäftsführender Gesellschafter / Federa / /

Position

analyst / software developer / system analyst / /

Product

SQL injections / /

ProgrammingLanguage

SQL / C / /

Technology

virtual machine / av / CRM / web browser protocols / classic testing technologies / command line interface / operating systems / network protocols / /

URL

http /

SocialTag