Paul Butcher on Fuzz Testing
Paul Butcher, senior software engineer, AdaCore, and lead U.K. engineer for the company’s High-Integrity, Complex, Large Software and Electronic Systems initiative, discusses fuzz testing, an automated technique to find security vulnerabilities and other software flaws. Host Philip Winston speaks wi...
Gespeichert in:
Veröffentlicht in: | IEEE software 2022-01, Vol.39 (1), p.118-120 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 120 |
---|---|
container_issue | 1 |
container_start_page | 118 |
container_title | IEEE software |
container_volume | 39 |
creator | Winston, Philip Blumen, Robert |
description | Paul Butcher, senior software engineer, AdaCore, and lead U.K. engineer for the company’s High-Integrity, Complex, Large Software and Electronic Systems initiative, discusses fuzz testing, an automated technique to find security vulnerabilities and other software flaws. Host Philip Winston speaks with Butcher about positive and negative testing, how fuzz testing fits into software development, brute force and blunt force fuzz testing, the American Fuzzy Lop fuzzer from Google, and how fuzz testing works for Ada. We provide summary excerpts below; to hear the full interview, visit http://www.se-radio.net or access our archives via RSS at http://feeds.feedburner.com/se-radio.—Robert Blumen |
doi_str_mv | 10.1109/MS.2021.3118906 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2613366339</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9662361</ieee_id><sourcerecordid>2613366339</sourcerecordid><originalsourceid>FETCH-LOGICAL-c284t-a22b166244463cc0059462463e3bf5c9e6c745c1ec25665e668faaba048eda483</originalsourceid><addsrcrecordid>eNo9kEFLw0AQhRdRMFbPHvQQ8Jx0Z3czyR61WBVaFFrPy2adaEpN6iY52F_vlhRPw4PvvTc8xq6BpwBcT5erVHABqQQoNMcTFoGWeaJAq1MW8VzxJFeZPmcXXbfhnGcgecRu3-ywjR-G3n2Rj9smng_7fbymrq-bz0t2VtltR1fHO2Hv88f17DlZvD69zO4XiROF6hMrRAmIQimF0rkQrVVQKEmWVeY0oQvNDsiJDDEjxKKytrRcFfRhVSEn7G7M3fn2ZwjdZtMOvgmVRiBIiSilDtR0pJxvu85TZXa-_rb-1wA3hwnMcmUOE5jjBMFxMzpqIvqndXhVhtg_cxZUEw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2613366339</pqid></control><display><type>article</type><title>Paul Butcher on Fuzz Testing</title><source>IEEE Electronic Library (IEL)</source><creator>Winston, Philip ; Blumen, Robert</creator><contributor>Robert Blumen</contributor><creatorcontrib>Winston, Philip ; Blumen, Robert ; Robert Blumen</creatorcontrib><description>Paul Butcher, senior software engineer, AdaCore, and lead U.K. engineer for the company’s High-Integrity, Complex, Large Software and Electronic Systems initiative, discusses fuzz testing, an automated technique to find security vulnerabilities and other software flaws. Host Philip Winston speaks with Butcher about positive and negative testing, how fuzz testing fits into software development, brute force and blunt force fuzz testing, the American Fuzzy Lop fuzzer from Google, and how fuzz testing works for Ada. We provide summary excerpts below; to hear the full interview, visit http://www.se-radio.net or access our archives via RSS at http://feeds.feedburner.com/se-radio.—Robert Blumen</description><identifier>ISSN: 0740-7459</identifier><identifier>EISSN: 1937-4194</identifier><identifier>DOI: 10.1109/MS.2021.3118906</identifier><identifier>CODEN: IESOEG</identifier><language>eng</language><publisher>Los Alamitos: IEEE</publisher><subject>Computer program integrity ; Electronic systems ; Engineers ; Software development</subject><ispartof>IEEE software, 2022-01, Vol.39 (1), p.118-120</ispartof><rights>Copyright IEEE Computer Society 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9662361$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9662361$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><contributor>Robert Blumen</contributor><creatorcontrib>Winston, Philip</creatorcontrib><creatorcontrib>Blumen, Robert</creatorcontrib><title>Paul Butcher on Fuzz Testing</title><title>IEEE software</title><addtitle>S-M</addtitle><description>Paul Butcher, senior software engineer, AdaCore, and lead U.K. engineer for the company’s High-Integrity, Complex, Large Software and Electronic Systems initiative, discusses fuzz testing, an automated technique to find security vulnerabilities and other software flaws. Host Philip Winston speaks with Butcher about positive and negative testing, how fuzz testing fits into software development, brute force and blunt force fuzz testing, the American Fuzzy Lop fuzzer from Google, and how fuzz testing works for Ada. We provide summary excerpts below; to hear the full interview, visit http://www.se-radio.net or access our archives via RSS at http://feeds.feedburner.com/se-radio.—Robert Blumen</description><subject>Computer program integrity</subject><subject>Electronic systems</subject><subject>Engineers</subject><subject>Software development</subject><issn>0740-7459</issn><issn>1937-4194</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kEFLw0AQhRdRMFbPHvQQ8Jx0Z3czyR61WBVaFFrPy2adaEpN6iY52F_vlhRPw4PvvTc8xq6BpwBcT5erVHABqQQoNMcTFoGWeaJAq1MW8VzxJFeZPmcXXbfhnGcgecRu3-ywjR-G3n2Rj9smng_7fbymrq-bz0t2VtltR1fHO2Hv88f17DlZvD69zO4XiROF6hMrRAmIQimF0rkQrVVQKEmWVeY0oQvNDsiJDDEjxKKytrRcFfRhVSEn7G7M3fn2ZwjdZtMOvgmVRiBIiSilDtR0pJxvu85TZXa-_rb-1wA3hwnMcmUOE5jjBMFxMzpqIvqndXhVhtg_cxZUEw</recordid><startdate>202201</startdate><enddate>202201</enddate><creator>Winston, Philip</creator><creator>Blumen, Robert</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope></search><sort><creationdate>202201</creationdate><title>Paul Butcher on Fuzz Testing</title><author>Winston, Philip ; Blumen, Robert</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c284t-a22b166244463cc0059462463e3bf5c9e6c745c1ec25665e668faaba048eda483</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer program integrity</topic><topic>Electronic systems</topic><topic>Engineers</topic><topic>Software development</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Winston, Philip</creatorcontrib><creatorcontrib>Blumen, Robert</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE software</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Winston, Philip</au><au>Blumen, Robert</au><au>Robert Blumen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Paul Butcher on Fuzz Testing</atitle><jtitle>IEEE software</jtitle><stitle>S-M</stitle><date>2022-01</date><risdate>2022</risdate><volume>39</volume><issue>1</issue><spage>118</spage><epage>120</epage><pages>118-120</pages><issn>0740-7459</issn><eissn>1937-4194</eissn><coden>IESOEG</coden><abstract>Paul Butcher, senior software engineer, AdaCore, and lead U.K. engineer for the company’s High-Integrity, Complex, Large Software and Electronic Systems initiative, discusses fuzz testing, an automated technique to find security vulnerabilities and other software flaws. Host Philip Winston speaks with Butcher about positive and negative testing, how fuzz testing fits into software development, brute force and blunt force fuzz testing, the American Fuzzy Lop fuzzer from Google, and how fuzz testing works for Ada. We provide summary excerpts below; to hear the full interview, visit http://www.se-radio.net or access our archives via RSS at http://feeds.feedburner.com/se-radio.—Robert Blumen</abstract><cop>Los Alamitos</cop><pub>IEEE</pub><doi>10.1109/MS.2021.3118906</doi><tpages>3</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0740-7459 |
ispartof | IEEE software, 2022-01, Vol.39 (1), p.118-120 |
issn | 0740-7459 1937-4194 |
language | eng |
recordid | cdi_proquest_journals_2613366339 |
source | IEEE Electronic Library (IEL) |
subjects | Computer program integrity Electronic systems Engineers Software development |
title | Paul Butcher on Fuzz Testing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T10%3A41%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Paul%20Butcher%20on%20Fuzz%20Testing&rft.jtitle=IEEE%20software&rft.au=Winston,%20Philip&rft.date=2022-01&rft.volume=39&rft.issue=1&rft.spage=118&rft.epage=120&rft.pages=118-120&rft.issn=0740-7459&rft.eissn=1937-4194&rft.coden=IESOEG&rft_id=info:doi/10.1109/MS.2021.3118906&rft_dat=%3Cproquest_RIE%3E2613366339%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2613366339&rft_id=info:pmid/&rft_ieee_id=9662361&rfr_iscdi=true |