The logic vulnerability has the characteristics of large quantities, great hazards and high potential. However, the coverage-guided fuzzing method is not very effective for checking poor vulnerability. This session will present a new fuzzing method to find the logic vulnerability automatically based on payload’s integrity.
DevSecOps & Application Security Mobile & IoT Security Analytics Intelligence & Response
security analytics mobile security application security anti-malware
Share With Your Community