ForAllSecure Blog

Try changing the filters above or reset your search

Useful Properties To Check With Fuzz Testing

Alex Rebert
·
February 25, 2021

The is part three of a three part series on Property-based Fuzz Testing. This article lists a number of useful properties that are commonly used to validate the correctness and safety of code. If you are not sure how to apply property-based fuzzing to your code, this list should give ...

The Hacker Mind Podcast: So You Want To Be A Pentester

Robert Vamosi
·
February 23, 2021

To help more people to become penetration testers, Kim Crawley and Phillip L. Wylie wrote The PenTester BluePrint: Starting A Career As An Ethical Hacker. In this episode of The Hacker Mind, Kim talks about the practical steps anyone can take to gain the skills and confidence necessary to become ...

To All The Tools I’ve Loved Before: The Fling (SCA)

Tamulyn Takakura
·
February 22, 2021

Valentine’s Day has unfortunately come to a close. What follows love? Heartbreak. That’s right, it's time to dust off your best stationary and bust out the ice cream because we’re writing a series of appsec break up letters.

What is Property-Based Fuzzing?

Alex Rebert
·
February 16, 2021

Fuzzing is the automated process of finding software bugs by feeding random data into a target program until one of those permutations reveals a flaw. Property-based testing is a form of fuzzing. Property-based testing feeds random data into an application (or function) and detects flaws. It is particularly powerful as it allows developers to define and check custom correctness and safety policies, i.e. properties they define in their test.

How to Address Software Reliability, Security, and Quality Requirements with Fuzz Testing

Tamulyn Takakura
·
February 11, 2021

Confidentiality, integrity, and availability are considered the three core principles of security. Similar to a three-bar stool, security falls apart without any one of these components. Thus, the CIA triad (Confidentiality, Integrity, Availability) posits that security should be assessed through these three lenses. The CIA triad can be used before ...

Stay Connected


Subscribe to Updates

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.