Demystify the Fuzzing Methods: A Comprehensive Survey
Massive software applications possess complex data structures or parse complex data structures; in such cases, vulnerabilities in the software become inevitable. The vulnerabilities are the source of cyber-security threats, and discovering this before the software deployment is challenging. Fuzzing...
Saved in:
Published in | ACM computing surveys Vol. 56; no. 3; pp. 1 - 38 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York, NY
ACM
31.03.2024
Association for Computing Machinery |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!