Posted on
in Presentations
The logic vulnerability has the characteristics of large quantities, great hazards and high potential. However, the coverage-guided fuzzing method is not very effective for checking poor vulnerability. This session will present a new fuzzing method to find the logic vulnerability automatically based on payload’s integrity.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community