Learn more about fuzzing instrumentation techniques, ranging from simple black box approaches to deeper types that can detect subtler failure modes.
Find More Bugs by Detecting Failure Better
Software can fail in many ways, including process crashes, infinite loops, memory leaks, data leakage, corruption, unexpected behavior, and more. Part of the challenge of fuzz testing is accurately detecting when failure occurs.
The Defensics fuzzer uses various types of instrumentation to detect failures. A spectrum of instrumentation techniques is available, ranging from simple black box approaches that can catch process crashes and hangs, to deeper types of instrumentation that can detect subtler failure modes.
This webinar describes the instrumentation techniques that are built into Defensics. You’ll learn how Defensics makes it easy to detect a wide variety of software failures, how Defensics can be extended to any type of instrumentation you can imagine, and how an agent framework makes it easy to detect failures by running specialized agents alongside your software target.
When: Tuesday, July 7 @ 9 a.m. Eastern / 2 p.m. BST
Who: Jonathan Knudsen, Technical Marketing Manager, Synopsys
*** This is a Security Bloggers Network syndicated blog from Software Integrity Blog authored by Synopsys Editorial Team. Read the original post at: https://www.synopsys.com/blogs/software-security/webinars-july-6-10/