Codenomicon

Results: 114



#Item
21

What is Fuzzing: The Poet, the Courier, and the Oracle Fuzzing is well established as an excellent technique for locating vulnerabilities in software. The basic premise is to deliver intentionally malformed input to targ

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
    22Security / Computer security / Critical Software / Computing / Software / Computer network security / Software testing / Codenomicon

    Creating Trust with Coriant Power suppliers, critical infrastructure providers, and network builders all operate in an unsafe world, where cyber attacks and network malfunctions can disrupt services. Coriant’s customer

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2015-06-08 10:21:12
    23Computer security / Zero-day attack / Computing / Computer network security / Codenomicon / Security

    Codenomicon-AppCheck-Symbol-Lock

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2015-06-08 10:21:10
    24Quality assurance / Software assurance / Evaluation / Security / Computer security / Codenomicon / Software development process / Computer network security / Software quality / Software development

    Media Contact: Stacy Simpson SAFECodeFOR IMMEDIATE RELEASE

    Add to Reading List

    Source URL: www.safecode.org

    Language: English - Date: 2014-08-15 15:56:11
    25Videotelephony / Computing / Network architecture / Codenomicon / Session Initiation Protocol / IPv4 / IPv6 / SipX / Oulu University Secure Programming Group / Voice over IP / Software testing / Computer network security

     BLACKHAT BRIEFINGS 2005 The Art of SIP fuzzing and Vulnerabilities Found in VoIP Ejovi Nuwere – Mikko Varpiola

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:41
    26Videotelephony / Codenomicon / Session Initiation Protocol / Oulu University Secure Programming Group / SipX / Software testing / Voice over IP / Computer network security

    BLACKHAT BRIEFINGS 2005 The Art of SIP fuzzing and Vulnerabilities Found in VoIP By Ejovi Nuwere & Mikko Varpiola

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:31
    27Software engineering / Evaluation / Codenomicon / Fault injection / Software testing / Software quality / Fuzz testing

    Fuzzing Daniel Bas´aez S. January 22, 2009

    Add to Reading List

    Source URL: www.verifysoft.com

    Language: English - Date: 2011-01-03 03:00:55
    28Technology / Medicine / Security / Software testing / Computer network security / Codenomicon

    Codenomicon-AppCheck-Symbol-Lock

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2015-05-12 21:22:18
    29Quality assurance / Codenomicon / Thought / Ethics / Business / Fault injection / Software testing / Fuzz testing / Robustness testing

    Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared DeMott Dr. Richard Enbody @msu.edu Dr. William Punch

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:37
    30Internet / Evaluation / Fuzz testing / Robustness testing / Border Gateway Protocol / Software testing / Codenomicon / Computing

    INPUT ATTACK TREES Death of a thousand leaves BlackHat Japan 2006 Heikki Kortti, Codenomicon Heikki Kortti, Codenomicon, Black Hat Japan, Oct 5-6

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:31
    UPDATE