fuzz testing

(redirected from Fuzzers)

fuzz testing

Attempting to cause a program or network to fail by feeding it randomly generated data. Fuzz testing is a black box technique that typically finds elementary bugs but is not a substitute for formal testing with test data that are carefully created. See black box testing and SAGE. See also fuzzy computer.
References in periodicals archive ?
The most comprehensive fuzzers, so called model-based fuzzers, utilize protocol specifications to intelligently target protocol areas most susceptible to vulnerabilities.
He concludes: "In addition to helping its customers identify and fix flaws in their solutions, Codenomicon also devotes both time and resources to repairing open-source libraries with its DEFENSICS(TM) fuzzers.
Python has become the preferred programming language for hackers, reverse engineers and software testers, and this guide for security-oriented programmers describes the debuggers, Trojans, fuzzers and emulators that are not clearly explained in existing low-level support services and libraries.
It's easy to write fuzzers for file format parsing problems, and while Microsoft's fuzzers may be more sophisticated, there are more hackers out there than Microsoft has employees.
He was alleged to have had a run-in with the Berlin fuzzers and was left facing charges of assault, insulting police officers and resisting arrest.
The new Universal Fuzzer combines 15 different fuzzers
These tools can be divided in three categories: static code analysis tools, reverse-engineering tools, and fuzzers.
McAfee Avert Labs expects this number to grow due to the increased use of fuzzers, which allow for large scale testing of applications, and due to the bounty program that rewards researchers for finding vulnerabilities.
Kicking off with three- minute heroics from Surge -whose crunchy Clashisms are always worth a cheer -the venue quickly filled up as angular thunder clapped fuzzers No hit the stage.
Unlike other testing tools, Fuzzers do not look for particular vulnerabilities.
They'll probably never find all of the vulnerabilities in the file formats," he continued, "because they may not be going back into these older products to [test] them with newer fuzzers.
Both standard and custom-built tools were used to perform automated and manual tests, including vulnerability scanners, port scanners, packet shaping tools and fuzzers to attempt to compromise the Westbridge XMS.