Codenomicon

Results: 114



#Item
31Security / Software testing / Hacking / Advanced persistent threat / Malware / Vulnerability / Stuxnet / Codenomicon / Attack / Cyberwarfare / Computer network security / Computer security

Review of the Year of 2014, the Moment of Network Security ——The annual report of network security in 2014 Security Research and Emergency Response Center of Antiy Labs

Add to Reading List

Source URL: www.antiy.net

Language: English
32Information / Fuzz testing / Internet protocols / Internet standards / File Transfer Protocol / Transmission Control Protocol / Communications protocol / Cyclic redundancy check / Codenomicon / Software testing / Computing / Data

Microsoft Word - Fuzz_21_CE_REVIEWED.doc

Add to Reading List

Source URL: www.fuzzing.org

Language: English - Date: 2012-01-18 22:33:23
33Risk / Computer security / Datagram Transport Layer Security / Tracker / Vulnerability / Codenomicon / Social vulnerability / Cloud9 / Software / Software testing / Computing

153 Somerford Road, Christchurch, Dorset, BH23 3TY, UK Tel: + Fax: + Web: www.datatrackplc.com Email:

Add to Reading List

Source URL: www.datatrackplc.com

Language: English - Date: 2014-04-29 06:44:47
34Security / Internet protocols / Secure communication / Cryptographic protocols / Cryptographic software / Transport Layer Security / OpenSSL / Vulnerability / Public key certificate / Cryptography / Electronic commerce / Computer security

CERT Australia OpenSSL heartbeat vulnerability - Heartbleed Abstract Researchers from Google security and Codenomicon have recently discovered a vulnerability in OpenSSL’s Transport Layer Security (TLS) and Datagram T

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-04-14 12:38:38
35Quality assurance / Fuzz testing / Codenomicon / Black-box testing / Vulnerability management / Vulnerability / Gray box testing / Oracle / Test automation / Software testing / Computer security / Software quality

What is Fuzzing: The Poet, the Courier, and the Oracle Fuzzing is well established as an excellent technique for locating vulnerabilities in software. The basic premise is to deliver intentionally malformed input to targ

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-04-01 19:53:30
36Codenomicon / Software engineering / Quality assurance / Oulu University Secure Programming Group / Reliability engineering / Software bug / Test automation / Software testing / Computer network security / Software quality

Premiere - BIOs • Mikko Mikko Varpiola is the test suite developer n:o 1 at Codenomicon and Director of Special Operations. His area of world class expertise is in anomaly design. Mikko knows what to feed

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:33
37Computer network security / Software testing / Crime prevention / National security / Secure communication / Vulnerability / Cyberwarfare / Computer security / Security

AppCheck Build a More Resilient World KEY APPCHECK FEATURES: • Scan Anything in Minutes

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-03-20 20:25:06
38Cyberwarfare / Computer security / Electronic commerce / Internet protocols / Internet standards / Codenomicon / Vulnerability / Bluetooth / Cisco IOS / Computer network security / Computing / Software testing

Defensics Build a More Resilient World KEY DEFENSICS FEATURES: • Next-Gen Fuzzing Technology Utilizes template, generation

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-03-20 20:25:06
39Software quality / Computer security / Oulu University Secure Programming Group / Codenomicon / Robustness testing / Vulnerability / Security testing / Application security / Social vulnerability / Software testing / Computer network security / Cyberwarfare

Christian Wieser, Marko Laakso and Henning Schulzrinne SIP Robustness Testing for Large-Scale Use

Add to Reading List

Source URL: www.mathematik.uni-ulm.de

Language: English - Date: 2004-10-02 05:59:46
40Computer network security / Codenomicon / Software testing

‹#› FINNISH APPROACH Collaborative, threat-indicator based cyber defence.

Add to Reading List

Source URL: giplatform.org

Language: English - Date: 2015-01-19 05:52:16
UPDATE