Paul Butcher on Fuzz Testing

Paul Butcher, senior software engineer, AdaCore, and lead U.K. engineer for the company’s High-Integrity, Complex, Large Software and Electronic Systems initiative, discusses fuzz testing, an automated technique to find security vulnerabilities and other software flaws. Host Philip Winston speaks wi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE software 2022-01, Vol.39 (1), p.118-120
Hauptverfasser: Winston, Philip, Blumen, Robert
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 120
container_issue 1
container_start_page 118
container_title IEEE software
container_volume 39
creator Winston, Philip
Blumen, Robert
description Paul Butcher, senior software engineer, AdaCore, and lead U.K. engineer for the company’s High-Integrity, Complex, Large Software and Electronic Systems initiative, discusses fuzz testing, an automated technique to find security vulnerabilities and other software flaws. Host Philip Winston speaks with Butcher about positive and negative testing, how fuzz testing fits into software development, brute force and blunt force fuzz testing, the American Fuzzy Lop fuzzer from Google, and how fuzz testing works for Ada. We provide summary excerpts below; to hear the full interview, visit http://www.se-radio.net or access our archives via RSS at http://feeds.feedburner.com/se-radio.—Robert Blumen
doi_str_mv 10.1109/MS.2021.3118906
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2613366339</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9662361</ieee_id><sourcerecordid>2613366339</sourcerecordid><originalsourceid>FETCH-LOGICAL-c284t-a22b166244463cc0059462463e3bf5c9e6c745c1ec25665e668faaba048eda483</originalsourceid><addsrcrecordid>eNo9kEFLw0AQhRdRMFbPHvQQ8Jx0Z3czyR61WBVaFFrPy2adaEpN6iY52F_vlhRPw4PvvTc8xq6BpwBcT5erVHABqQQoNMcTFoGWeaJAq1MW8VzxJFeZPmcXXbfhnGcgecRu3-ywjR-G3n2Rj9smng_7fbymrq-bz0t2VtltR1fHO2Hv88f17DlZvD69zO4XiROF6hMrRAmIQimF0rkQrVVQKEmWVeY0oQvNDsiJDDEjxKKytrRcFfRhVSEn7G7M3fn2ZwjdZtMOvgmVRiBIiSilDtR0pJxvu85TZXa-_rb-1wA3hwnMcmUOE5jjBMFxMzpqIvqndXhVhtg_cxZUEw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2613366339</pqid></control><display><type>article</type><title>Paul Butcher on Fuzz Testing</title><source>IEEE Electronic Library (IEL)</source><creator>Winston, Philip ; Blumen, Robert</creator><contributor>Robert Blumen</contributor><creatorcontrib>Winston, Philip ; Blumen, Robert ; Robert Blumen</creatorcontrib><description>Paul Butcher, senior software engineer, AdaCore, and lead U.K. engineer for the company’s High-Integrity, Complex, Large Software and Electronic Systems initiative, discusses fuzz testing, an automated technique to find security vulnerabilities and other software flaws. Host Philip Winston speaks with Butcher about positive and negative testing, how fuzz testing fits into software development, brute force and blunt force fuzz testing, the American Fuzzy Lop fuzzer from Google, and how fuzz testing works for Ada. We provide summary excerpts below; to hear the full interview, visit http://www.se-radio.net or access our archives via RSS at http://feeds.feedburner.com/se-radio.—Robert Blumen</description><identifier>ISSN: 0740-7459</identifier><identifier>EISSN: 1937-4194</identifier><identifier>DOI: 10.1109/MS.2021.3118906</identifier><identifier>CODEN: IESOEG</identifier><language>eng</language><publisher>Los Alamitos: IEEE</publisher><subject>Computer program integrity ; Electronic systems ; Engineers ; Software development</subject><ispartof>IEEE software, 2022-01, Vol.39 (1), p.118-120</ispartof><rights>Copyright IEEE Computer Society 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9662361$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9662361$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><contributor>Robert Blumen</contributor><creatorcontrib>Winston, Philip</creatorcontrib><creatorcontrib>Blumen, Robert</creatorcontrib><title>Paul Butcher on Fuzz Testing</title><title>IEEE software</title><addtitle>S-M</addtitle><description>Paul Butcher, senior software engineer, AdaCore, and lead U.K. engineer for the company’s High-Integrity, Complex, Large Software and Electronic Systems initiative, discusses fuzz testing, an automated technique to find security vulnerabilities and other software flaws. Host Philip Winston speaks with Butcher about positive and negative testing, how fuzz testing fits into software development, brute force and blunt force fuzz testing, the American Fuzzy Lop fuzzer from Google, and how fuzz testing works for Ada. We provide summary excerpts below; to hear the full interview, visit http://www.se-radio.net or access our archives via RSS at http://feeds.feedburner.com/se-radio.—Robert Blumen</description><subject>Computer program integrity</subject><subject>Electronic systems</subject><subject>Engineers</subject><subject>Software development</subject><issn>0740-7459</issn><issn>1937-4194</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kEFLw0AQhRdRMFbPHvQQ8Jx0Z3czyR61WBVaFFrPy2adaEpN6iY52F_vlhRPw4PvvTc8xq6BpwBcT5erVHABqQQoNMcTFoGWeaJAq1MW8VzxJFeZPmcXXbfhnGcgecRu3-ywjR-G3n2Rj9smng_7fbymrq-bz0t2VtltR1fHO2Hv88f17DlZvD69zO4XiROF6hMrRAmIQimF0rkQrVVQKEmWVeY0oQvNDsiJDDEjxKKytrRcFfRhVSEn7G7M3fn2ZwjdZtMOvgmVRiBIiSilDtR0pJxvu85TZXa-_rb-1wA3hwnMcmUOE5jjBMFxMzpqIvqndXhVhtg_cxZUEw</recordid><startdate>202201</startdate><enddate>202201</enddate><creator>Winston, Philip</creator><creator>Blumen, Robert</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope></search><sort><creationdate>202201</creationdate><title>Paul Butcher on Fuzz Testing</title><author>Winston, Philip ; Blumen, Robert</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c284t-a22b166244463cc0059462463e3bf5c9e6c745c1ec25665e668faaba048eda483</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer program integrity</topic><topic>Electronic systems</topic><topic>Engineers</topic><topic>Software development</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Winston, Philip</creatorcontrib><creatorcontrib>Blumen, Robert</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE software</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Winston, Philip</au><au>Blumen, Robert</au><au>Robert Blumen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Paul Butcher on Fuzz Testing</atitle><jtitle>IEEE software</jtitle><stitle>S-M</stitle><date>2022-01</date><risdate>2022</risdate><volume>39</volume><issue>1</issue><spage>118</spage><epage>120</epage><pages>118-120</pages><issn>0740-7459</issn><eissn>1937-4194</eissn><coden>IESOEG</coden><abstract>Paul Butcher, senior software engineer, AdaCore, and lead U.K. engineer for the company’s High-Integrity, Complex, Large Software and Electronic Systems initiative, discusses fuzz testing, an automated technique to find security vulnerabilities and other software flaws. Host Philip Winston speaks with Butcher about positive and negative testing, how fuzz testing fits into software development, brute force and blunt force fuzz testing, the American Fuzzy Lop fuzzer from Google, and how fuzz testing works for Ada. We provide summary excerpts below; to hear the full interview, visit http://www.se-radio.net or access our archives via RSS at http://feeds.feedburner.com/se-radio.—Robert Blumen</abstract><cop>Los Alamitos</cop><pub>IEEE</pub><doi>10.1109/MS.2021.3118906</doi><tpages>3</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0740-7459
ispartof IEEE software, 2022-01, Vol.39 (1), p.118-120
issn 0740-7459
1937-4194
language eng
recordid cdi_proquest_journals_2613366339
source IEEE Electronic Library (IEL)
subjects Computer program integrity
Electronic systems
Engineers
Software development
title Paul Butcher on Fuzz Testing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T10%3A41%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Paul%20Butcher%20on%20Fuzz%20Testing&rft.jtitle=IEEE%20software&rft.au=Winston,%20Philip&rft.date=2022-01&rft.volume=39&rft.issue=1&rft.spage=118&rft.epage=120&rft.pages=118-120&rft.issn=0740-7459&rft.eissn=1937-4194&rft.coden=IESOEG&rft_id=info:doi/10.1109/MS.2021.3118906&rft_dat=%3Cproquest_RIE%3E2613366339%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2613366339&rft_id=info:pmid/&rft_ieee_id=9662361&rfr_iscdi=true