Don’t miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from April 17-21, 2023. Learn more at https://kubecon.io The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects.
Fuzzing Session: Finding Bugs and Vulnerabilities Automatically - David Korczynski & Adam Korczynski, Ada Logics
Speakers: David Korczynski, Adam Korczynski
In this session Adam and David invites attendees to an in-depth look at fuzzing starting with the basics and moving on to advanced topics. The presentation will focus on fuzzing open source software and cover why it is important to fuzz your software by way of brief introductions followed by a series of case studies.
Fuzzing is a technique to automate testing software for bugs and vulnerabilities. Fuzzing is performed by writing a test harness that passes seemingly pseudo-random data to a target application with the goal of finding bugs and vulnerabilities. Adam and David have written fuzzers for more than 200 open source projects which have led to finding thousands of bugs of which many were security-critical.
The presentation will also cover important open-source projects related to fuzzing such as OSS-Fuzz and Fuzz Introspector.
This talk is aimed at a broad audience including those who are new to fuzzing as well as those with some fuzzing experience.
Поделиться в:
Доступные форматы для скачивания:
Скачать видео mp4
Информация по загрузке:
Скачать аудио mp3
Похожие видео
array(10) {
[0]=>
object(stdClass)#4194 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "_kBPjKpOFgc"
["related_video_title"]=>
string(103) "Implementing Private 5G Networks For Enterprises With Kubernetes - Amar Kapadia & Christian Huebner"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(40) "CNCF [Cloud Native Computing Foundation]"
}
[1]=>
object(stdClass)#4167 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ZdshB1qcgvw"
["related_video_title"]=>
string(55) "RoboCon 2024 - Fuzzing for vulnerabilities in REST APIS"
["posted_time"]=>
string(27) "7 месяцев назад"
["channelName"]=>
string(15) "Robot Framework"
}
[2]=>
object(stdClass)#4192 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7KWPiRq3ZYI"
["related_video_title"]=>
string(54) "GopherCon 2022: Fuzz Testing Made Easy - Katie Hockman"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(14) "Gopher Academy"
}
[3]=>
object(stdClass)#4199 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "PJLWlmp8CDM"
["related_video_title"]=>
string(58) "Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(12) "LiveOverflow"
}
[4]=>
object(stdClass)#4178 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "6YLz9IGAGLw"
["related_video_title"]=>
string(48) "Fuzzing with AFL - by Michael Macnair (Workshop)"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(16) "Red Team Village"
}
[5]=>
object(stdClass)#4196 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "lPTU-xwGQ0w"
["related_video_title"]=>
string(91) "Interactive Guide: Pruning, Quantization, and Knowledge Distillation - Free GitHub Workbook"
["posted_time"]=>
string(19) "3 дня назад"
["channelName"]=>
string(6) "Ebayed"
}
[6]=>
object(stdClass)#4191 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "diUiwAEPjcQ"
["related_video_title"]=>
string(26) "your software is too fuzzy"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(9) "Low Level"
}
[7]=>
object(stdClass)#4201 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "pWywnV6yw1k"
["related_video_title"]=>
string(16) "Fuzzing calc.exe"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(10) "gamozolabs"
}
[8]=>
object(stdClass)#4177 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "blWdjRUPP6E"
["related_video_title"]=>
string(72) "Разведчик о том, как использовать людей"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
string(18) "Коллектив"
}
[9]=>
object(stdClass)#4195 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "hFcEVM0moYU"
["related_video_title"]=>
string(58) "Как Путин видит окончание войны"
["posted_time"]=>
string(23) "5 часов назад"
["channelName"]=>
string(27) "Анатолий Шарий"
}
}