fuzz

(redirected from fuzzing)
Also found in: Dictionary, Thesaurus, Idioms, Wikipedia.
Related to fuzzing: fuzzing attack

fuzz

[fəz]
(materials)
Fibers which protrude from the surface of a sheet of paper.
References in periodicals archive ?
The process for doing so involves a technique known as fuzzing.
* We have designed an Intent specification language to describe the structure of Intent, which makes our Intent fuzzing tool flexible allowing an arbitrary combination of Intent generators and Intent executors through a well-defined interface.
The second updated edition of Fuzzing for Software Security Testing and Quality Assurance covers the latest information on how and why to integrating fuzzing into software development, and considers the process of fuzzing, tools, and the latest automation systems.
However, all three fuzzing approaches above achieve low coverage for applications with checksum mechanism.
"By analyzing such a large data set from our customers, the Synopsys fuzzing report provides visibility into unknown, hard-to-find vulnerabilities and highlights where security teams should look to improve the quality and security of their software."
In this paper, we present a refined algorithm for generating fuzzing test cases for Zigbee, FSM-fuzzing.
In my opinion, the main strength of fuzzing is its ability to find completely new vulnerabilities.
In this paper, we design an automatic fuzzing framework that can be used to investigate potential injection vulnerabilities for modern HTML5 websites.
CyberFlood Advanced Fuzzing combines the two main fuzzing strategies, generation-based and mutation-based, into one new intelligence driven strategy to provide you greater depth and breadth in your testing to find more issues than previously possible.
* Fuzzing is an effective automatic technique to find vulnerabilities.
That leaves fuzzing as the only proactive means for protecting your system.
Fuzzing, in which software security vulnerabilities are identified by attaching a program's inputs to a random set of data, is treated as one of the most effective security testing approaches.