Fuzz Testing

5G: Vast potential, but better security needed

5G security is top of mind for those who recognize that 5G is going to be higher risk. Fuzzing is…

10 months ago

World’s top hackers meet at the first 5G Cyber Security Hackathon

Our Defensics R&D team put a couple of Synopsys tools to the test in the 5G Cyber Security Hackathon in…

1 year ago

Q&A: Fuzz testing, agent instrumentation, and Defensics

Do you have questions about fuzz testing? We’ve got answers, explanations, and recommendations from our last webinar on fuzzing using…

1 year ago

[Webinars] Automotive fuzz testing and financial services AppSec

Learn how agent instrumentation improves fuzz testing of automotive IVI and telematics systems, and about financial services application security. The…

1 year ago

WPA2 encryption bypass: Using Defensics to uncover behavioral vulnerabilities

We discovered a WPA2 encryption bypass vulnerability (CVE-2018-18907) in a router that allows full access to a WLAN without credentials.…

2 years ago

Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

In part two of this series, learn how to create a data model for the Bitcoin network protocol and use…

2 years ago

Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

This is the first part of a two-part advanced technical tutorial that describes how you can use the Defensics SDK…

2 years ago