- Mon 27 January 2020
- Paper Review
- Joseph Anthony C. Hermocilla
Fuzzing: Hack, Art, and Science
A program usually accepts input, performs operations on the input, and produces output. Incorrect processing of input can lead to security vulnerabilities, such as buffer overflow. Depending on the input, the program may not perform the desired operation. An attacker can craft a specialized input that exploits the vulnerability to …