article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. Understand Where You Currently Fit Into the Malware Analysis Process. I like grouping them in 4 categories, which I detailed in the post Mastering 4 Stages of Malware Analysis.

Metadata 145
article thumbnail

Beginning Fuzz Cycle Automation: Improving Testing And Fuzz Development With Coverage Analysis

ForAllSecure

In my previous post , we covered using bncov to do open-ended coverage analysis tasks to inform our testing. This time we’ll take a look at how to write better tests in the form of harness programs (also known as fuzz drivers, programs written to exercise specific parts of the code) that we will use for fuzz testing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BEGINNING FUZZ CYCLE AUTOMATION: IMPROVING TESTING AND FUZZ DEVELOPMENT WITH COVERAGE ANALYSIS

ForAllSecure

In my previous post , we covered using bncov to do open-ended coverage analysis tasks to inform our testing. This time we’ll take a look at how to write better tests in the form of harness programs (also known as fuzz drivers, programs written to exercise specific parts of the code) that we will use for fuzz testing.

article thumbnail

Beginning Fuzz Cycle Automation: Improving Testing And Fuzz Development With Coverage Analysis

ForAllSecure

In my previous post , we covered using bncov to do open-ended coverage analysis tasks to inform our testing. This time we’ll take a look at how to write better tests in the form of harness programs (also known as fuzz drivers, programs written to exercise specific parts of the code) that we will use for fuzz testing.

article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Top Takeaways From The “Knowing The Unfuzzed And Finding Bugs With Coverage Analysis” Webinar

ForAllSecure

ForAllSecure security researcher, Mark Griffin, sought to identify a solution to those that struggle with these questions and points to one possible solution: automated coverage analysis. Coverage analysis can be done with tools and workflows that are uncommon among software developers and security researchers alike.

article thumbnail

TOP TAKEAWAYS FROM THE “KNOWING THE UNFUZZED AND FINDING BUGS WITH COVERAGE ANALYSIS” WEBINAR

ForAllSecure

ForAllSecure security researcher, Mark Griffin, sought to identify a solution to those that struggle with these questions and points to one possible solution: automated coverage analysis. Coverage analysis can be done with tools and workflows that are uncommon among software developers and security researchers alike.