Fuzzing for software security testing and quality assurance /

This newly revised and expanded second edition of the popular Artech House title, Fuzzing for Software Security Testing and Quality Assurance, provides practical and professional guidance on how and why to integrate fuzzing into the software development lifecycle. This edition introduces fuzzing as...

Full description

Saved in:
Bibliographic Details
Main Authors: Takanen, Ari (Author), DeMott, Jared (Author), Miller, Charles, 1951- (Author), Kettunen, Atte (Author)
Format: Electronic eBook
Language:English
Published: Boston, MA : Artech House, [2018]
Edition:Second edition.
Series:Artech House information security and privacy series.
Subjects:
Online Access:Full text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Access E-Book
Full text (Wentworth users only)

MARC

LEADER 00000cam a2200000 i 4500
001 8d57aeb7-8202-4bed-8e57-ebaf8195317a
005 20240828000000.0
008 180614s2018 maua ob 001 0 eng d
019 |a 1039926205 
020 |a 9781630815196  |q (electronic bk.) 
020 |a 1630815195  |q (electronic bk.) 
020 |z 9781608078509 
020 |z 1608078507 
035 |a (OCoLC)1040072327  |z (OCoLC)1039926205 
035 |a (OCoLC)on1040072327 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDX  |d EBLCP  |d OCLCF  |d CUV  |d CUY  |d NRC  |d OCLCQ  |d K6U  |d UKAHL  |d IEEEE  |d OCLCO  |d OCLCQ  |d OCLCO  |d UPM  |d OCLCQ  |d OCLCO  |d OCLCL 
050 4 |a QA76.9.A25  |b F89 2018eb 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Fuzzing for software security testing and quality assurance /  |c Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen. 
250 |a Second edition. 
264 1 |a Boston, MA :  |b Artech House,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Artech House information security and privacy series 
504 |a Includes bibliographical references and index. 
505 0 |a Intro; Fuzzing for Software Security Testing and Quality Assurance, Second Edition; Foreword from the First Edition; Foreword to the Second Edition; Preface from the First Edition; Preface to the Second Edition; Chapter 1 Introduction; 1.1 Software Security; 1.1.1 Security Incident; 1.1.2 Disclosure Processes; 1.1.3 Attack Surfaces and Attack Vectors; 1.1.4 Reasons Behind Security Mistakes; 1.1.5 Proactive Security; 1.1.6 Security Requirements; 1.2 Software Quality; 1.2.1 Cost-Benefit of Quality; 1.2.2 Target of Test; 1.2.3 Testing Purposes and Test Verdicts; 1.2.4 Structural Testing 
505 8 |a 1.2.5 Functional Testing1.2.6 Code Auditing; 1.3 Introduction to Fuzzing; 1.3.1 Brief History of Fuzzing; 1.3.2 Fuzzing Overview; 1.3.3 Vulnerabilities Found with Fuzzing; 1.3.4 Fuzzer Types; 1.3.5 Logical Structure of a Fuzzer; 1.3.6 Fuzzing Process; 1.3.7 Fuzzing Frameworks and Test Suites; 1.3.8 Fuzzing and the Enterprise; 1.4 Book Goals and Layout; Chapter 2 Software Vulnerability Analysis; 2.1 Purpose of Vulnerability Analysis; 2.1.1 Security and Vulnerability Scanners; 2.2 People Conducting Vulnerability Analysis; 2.2.1 Hackers; 2.2.2 Vulnerability Analysts or Security Researchers 
505 8 |a 2.2.3 Penetration Testers2.2.4 Software Security Testers; 2.2.5 IT Security Engineers; 2.3 Target Software; 2.4 Basic Bug Categories; 2.4.1 Memory Corruption Errors; 2.4.2 Web Applications; 2.4.3 Brute Force Login; 2.4.4 Race Condition; 2.4.5 Denial of Service; 2.4.6 Session Hijacking; 2.4.7 Man in the Middle; 2.4.8 Cryptographic Attacks; 2.5 Bug Hunting Techniques; 2.5.1 Reverse Engineering; 2.5.2 Source Code Auditing; 2.6 Fuzzing; 2.6.1 Basic Terms; 2.6.2 Hostile Data; 2.6.3 Number of Tests; 2.7 Defenses; 2.7.1 Why Fuzzing Works; 2.7.2 Defensive Coding; 2.7.3 Input Verification 
505 8 |a 2.7.4 Hardware Overflow Protection2.7.5 Software Overflow Protection; 2.8 Summary; Chapter 3 Quality Assurance and Testing; 3.1 Quality Assurance and Security; 3.1.1 Security in Software Development; 3.1.2 Security Defects; 3.2 Measuring Quality; 3.2.1 Quality Is About Validation of Features; 3.2.2 Quality Is About Finding Defects; 3.2.3 Quality Is a Feedback Loop to Development; 3.2.4 Quality Brings Visibility to the Development Process; 3.2.5 End Users' Perspective; 3.3 Testing for Quality; 3.3.1 V-Model; 3.3.2 Testing on the Developer's Desktop; 3.3.3 Testing the Design 
505 8 |a 3.4 Main Categories of Testing3.4.1 Validation Testing Versus Defect Testing; 3.4.2 Structural Versus Functional Testing; 3.5 White-Box Testing; 3.5.1 Making the Code Readable; 3.5.2 Inspections and Reviews; 3.5.3 Code Auditing; 3.6 Black-Box Testing; 3.6.1 Software Interfaces; 3.6.2 Test Targets; 3.6.3 Fuzz Testing as a Profession; 3.7 Purposes of Black-Box Testing; 3.7.1 Conformance Testing; 3.7.2 Functional Security Testing; 3.7.3 Functional Safety Testing; 3.7.4 Interoperability Testing; 3.7.5 Performance Testing; 3.7.6 Robustness Testing; 3.8 Testing Metrics; 3.8.1 Specification Coverage 
520 3 |a This newly revised and expanded second edition of the popular Artech House title, Fuzzing for Software Security Testing and Quality Assurance, provides practical and professional guidance on how and why to integrate fuzzing into the software development lifecycle. This edition introduces fuzzing as a process, goes through commercial tools, and explains what the customer requirements are for fuzzing. The advancement of evolutionary fuzzing tools, including American Fuzzy Lop (AFL) and the emerging full fuzz test automation systems are explored in this edition. Traditional software programmers and testers will learn how to make fuzzing a standard practice that integrates seamlessly with all development activities. It surveys all popular commercial fuzzing tools and explains how to select the right one for software development projects.nnThis book is a powerful new tool to build secure, high-quality software taking a weapon from the malicious hacker's arsenal. This practical resource helps engineers find and patch flaws in software before harmful viruses, worms, and Trojans can use these vulnerabilities to rampage systems. The book shows how to make fuzzing a standard practice that integrates seamlessly with all development activities.  |c Publisher abstract. 
588 0 |a Print version record. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed June 15, 2018) 
590 |a ProQuest Ebook Central  |b Ebook Central College Complete 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer software  |x Development. 
650 2 |a Computer Security 
700 1 |a Takanen, Ari,  |e author. 
700 1 |a DeMott, Jared,  |e author. 
700 1 |a Miller, Charles,  |d 1951-  |e author.  |1 https://id.oclc.org/worldcat/entity/E39PCjHtRGBPW6CbtxXtFBpF8C 
700 1 |a Kettunen, Atte,  |e author. 
758 |i has work:  |a Fuzzing for software security testing and quality assurance (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH7mhjBmjyg6yTK7D4kKv3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Fuzzing for software security testing and quality assurance.  |b Second edition.  |d Norwood, MA : Artech House, [2018]  |z 1608078507  |w (OCoLC)1005685377 
830 0 |a Artech House information security and privacy series. 
856 4 0 |u https://ebookcentral.proquest.com/lib/emerson/detail.action?docID=5430720  |z Full text (Emerson users only)  |t 0 
856 4 0 |u https://ebookcentral.proquest.com/lib/emmanuel/detail.action?docID=5430720  |z Full text (Emmanuel users only)  |t 0 
856 4 0 |u https://ebookcentral.proquest.com/lib/neco/detail.action?docID=5430720  |z Full text (NECO users only)  |t 0 
856 4 0 |u https://ebookcentral.proquest.com/lib/mcphs/detail.action?docID=5430720  |z Full text (MCPHS users only)  |t 0 
856 4 0 |u https://ebookcentral.proquest.com/lib/simmons-ebooks/detail.action?docID=5430720  |y Access E-Book  |t 0 
856 4 0 |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=5430720  |z Full text (Wentworth users only)  |t 0 
999 1 0 |i 8d57aeb7-8202-4bed-8e57-ebaf8195317a  |l in00000285703  |s US-MBE  |m fuzzing_for_software_security_testing_and_quality_assurance________________2018____2__arteca___________________________________________________________________________e 
999 1 0 |i 8d57aeb7-8202-4bed-8e57-ebaf8195317a  |l in00000157183  |s US-MBEMM  |m fuzzing_for_software_security_testing_and_quality_assurance________________2018____2__arteca___________________________________________________________________________e 
999 1 0 |i 8d57aeb7-8202-4bed-8e57-ebaf8195317a  |l in00000004038  |s US-MBNECO  |m fuzzing_for_software_security_testing_and_quality_assurance________________2018____2__arteca___________________________________________________________________________e 
999 1 0 |i 8d57aeb7-8202-4bed-8e57-ebaf8195317a  |l in00000349846  |s US-MBP  |m fuzzing_for_software_security_testing_and_quality_assurance________________2018____2__arteca___________________________________________________________________________e 
999 1 0 |i 8d57aeb7-8202-4bed-8e57-ebaf8195317a  |l EBC5430720  |s US-MBSI  |m fuzzing_for_software_security_testing_and_quality_assurance________________2018____2__arteca___________________________________________________________________________e 
999 1 0 |i 8d57aeb7-8202-4bed-8e57-ebaf8195317a  |l in00000395445  |s US-MBWI  |m fuzzing_for_software_security_testing_and_quality_assurance________________2018____2__arteca___________________________________________________________________________e 
999 1 1 |l in00000285703  |s ISIL:US-MBE  |i Emerson  |t BKS  |a EBooks  |c ProQuest  |d Other scheme  |x E-Resource  |p UNLOANABLE 
999 1 1 |l in00000157183  |s ISIL:US-MBEMM  |i Emmanuel  |t BKS  |a Online  |c ProQuest  |d Other scheme  |p UNLOANABLE 
999 1 1 |l in00000004038  |s ISIL:US-MBNECO  |i NECO  |t BKS  |a eBooks  |c ProQuest  |d Other scheme  |p UNLOANABLE 
999 1 1 |l in00000349846  |s ISIL:US-MBP  |i MCPHS  |t BKS  |a E-Collections  |c ProQuest  |d Other scheme  |p UNLOANABLE 
999 1 1 |l EBC5430720  |s ISIL:US-MBSI  |i Simmons Univeristy  |t BKS  |a Online Resources  |c TK5105.59 .F899 2018  |d Library of Congress classification  |x sound recording  |p UNLOANABLE 
999 1 1 |l in00000395445  |s ISIL:US-MBWI  |i Wentworth  |t BKS  |a Ebooks  |c ProQuest  |d Other scheme  |p UNLOANABLE