Leveraging Fuzz Testing to Achieve ED-203A / DO-356A
ForAllSecure
JUNE 7, 2021
Even when the overall system architecture and design are acceptably robust against adversaries, the software implementation may bring hidden vulnerabilities that allow bypass of the intended architecture. As noted in ED-203A / DO-356A, most of the vulnerabilities that get published are software vulnerabilities.
Let's personalize your content