-
Notifications
You must be signed in to change notification settings - Fork 184
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add Stefan's GrrCon 2019 talk about symbolically executing a fuzz tar…
…get.
- Loading branch information
1 parent
f930379
commit a689460
Showing
2 changed files
with
15 additions
and
0 deletions.
There are no files selected for viewing
15 changes: 15 additions & 0 deletions
15
presentations/Symbolically Executing a Fuzzy Tyrant/README.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
Symbolically Executing a Fuzzy Tyrant | ||
==================================== | ||
|
||
Code reviewers and penetration testers are familiar with the normal dynamic and static application security tools (DAST|SAST). These tools can provide varying levels of coverage with varying levels of false/true positives. However, there are other classes of tools that can provide deeper understanding and more vulnerabilities in the same amount of time as traditional tools. This talk covers two such classes: (smart) fuzzers and symbolic execution. As a practicum, it is focused on every-day scenarios that normal security analysts face, rather than theoretical attacks in an academic setting. The author’s current setup is provided as an example. | ||
|
||
Presented at | ||
|
||
* [GrrCon 2019](http://grrcon.com/schedule/) | ||
|
||
Resources | ||
|
||
* Slides: [Symbolically Executing a Fuzzy Tyrant](symbolically_executing_a_fuzzy_tyrant.pdf) | ||
|
||
Authors | ||
* Stefan Edwards |
Binary file added
BIN
+2.48 MB
...entations/Symbolically Executing a Fuzzy Tyrant/symbolically_executing_a_fuzzy_tyrant.pdf
Binary file not shown.