Cargando…

Fuzzing for software security testing and quality assurance /

This newly revised and expanded second edition of the popular Artech House title, Fuzzing for Software Security Testing and Quality Assurance, provides practical and professional guidance on how and why to integrate fuzzing into the software development lifecycle. This edition introduces fuzzing as...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Takanen, Ari (Autor), DeMott, Jared (Autor), Miller, Charles, 1951- (Autor), Kettunen, Atte (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston, MA : Artech House, [2018]
Edición:Second edition.
Colección:Artech House information security and privacy series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1040072327
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 180614s2018 maua ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDX  |d EBLCP  |d OCLCF  |d CUV  |d CUY  |d NRC  |d OCLCQ  |d K6U  |d UKAHL  |d IEEEE  |d OCLCO  |d OCLCQ  |d OCLCO  |d UPM  |d OCLCQ  |d OCLCO 
019 |a 1039926205 
020 |a 9781630815196  |q (electronic bk.) 
020 |a 1630815195  |q (electronic bk.) 
020 |z 9781608078509 
020 |z 1608078507 
035 |a (OCoLC)1040072327  |z (OCoLC)1039926205 
050 4 |a QA76.9.A25  |b F89 2018eb 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Fuzzing for software security testing and quality assurance /  |c Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen. 
250 |a Second edition. 
264 1 |a Boston, MA :  |b Artech House,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Artech House information security and privacy series 
588 0 |a Print version record. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed June 15, 2018) 
504 |a Includes bibliographical references and index. 
505 0 |a Intro; Fuzzing for Software Security Testing and Quality Assurance, Second Edition; Foreword from the First Edition; Foreword to the Second Edition; Preface from the First Edition; Preface to the Second Edition; Chapter 1 Introduction; 1.1 Software Security; 1.1.1 Security Incident; 1.1.2 Disclosure Processes; 1.1.3 Attack Surfaces and Attack Vectors; 1.1.4 Reasons Behind Security Mistakes; 1.1.5 Proactive Security; 1.1.6 Security Requirements; 1.2 Software Quality; 1.2.1 Cost-Benefit of Quality; 1.2.2 Target of Test; 1.2.3 Testing Purposes and Test Verdicts; 1.2.4 Structural Testing 
505 8 |a 1.2.5 Functional Testing1.2.6 Code Auditing; 1.3 Introduction to Fuzzing; 1.3.1 Brief History of Fuzzing; 1.3.2 Fuzzing Overview; 1.3.3 Vulnerabilities Found with Fuzzing; 1.3.4 Fuzzer Types; 1.3.5 Logical Structure of a Fuzzer; 1.3.6 Fuzzing Process; 1.3.7 Fuzzing Frameworks and Test Suites; 1.3.8 Fuzzing and the Enterprise; 1.4 Book Goals and Layout; Chapter 2 Software Vulnerability Analysis; 2.1 Purpose of Vulnerability Analysis; 2.1.1 Security and Vulnerability Scanners; 2.2 People Conducting Vulnerability Analysis; 2.2.1 Hackers; 2.2.2 Vulnerability Analysts or Security Researchers 
505 8 |a 2.2.3 Penetration Testers2.2.4 Software Security Testers; 2.2.5 IT Security Engineers; 2.3 Target Software; 2.4 Basic Bug Categories; 2.4.1 Memory Corruption Errors; 2.4.2 Web Applications; 2.4.3 Brute Force Login; 2.4.4 Race Condition; 2.4.5 Denial of Service; 2.4.6 Session Hijacking; 2.4.7 Man in the Middle; 2.4.8 Cryptographic Attacks; 2.5 Bug Hunting Techniques; 2.5.1 Reverse Engineering; 2.5.2 Source Code Auditing; 2.6 Fuzzing; 2.6.1 Basic Terms; 2.6.2 Hostile Data; 2.6.3 Number of Tests; 2.7 Defenses; 2.7.1 Why Fuzzing Works; 2.7.2 Defensive Coding; 2.7.3 Input Verification 
505 8 |a 2.7.4 Hardware Overflow Protection2.7.5 Software Overflow Protection; 2.8 Summary; Chapter 3 Quality Assurance and Testing; 3.1 Quality Assurance and Security; 3.1.1 Security in Software Development; 3.1.2 Security Defects; 3.2 Measuring Quality; 3.2.1 Quality Is About Validation of Features; 3.2.2 Quality Is About Finding Defects; 3.2.3 Quality Is a Feedback Loop to Development; 3.2.4 Quality Brings Visibility to the Development Process; 3.2.5 End Users' Perspective; 3.3 Testing for Quality; 3.3.1 V-Model; 3.3.2 Testing on the Developer's Desktop; 3.3.3 Testing the Design 
505 8 |a 3.4 Main Categories of Testing3.4.1 Validation Testing Versus Defect Testing; 3.4.2 Structural Versus Functional Testing; 3.5 White-Box Testing; 3.5.1 Making the Code Readable; 3.5.2 Inspections and Reviews; 3.5.3 Code Auditing; 3.6 Black-Box Testing; 3.6.1 Software Interfaces; 3.6.2 Test Targets; 3.6.3 Fuzz Testing as a Profession; 3.7 Purposes of Black-Box Testing; 3.7.1 Conformance Testing; 3.7.2 Functional Security Testing; 3.7.3 Functional Safety Testing; 3.7.4 Interoperability Testing; 3.7.5 Performance Testing; 3.7.6 Robustness Testing; 3.8 Testing Metrics; 3.8.1 Specification Coverage 
520 3 |a This newly revised and expanded second edition of the popular Artech House title, Fuzzing for Software Security Testing and Quality Assurance, provides practical and professional guidance on how and why to integrate fuzzing into the software development lifecycle. This edition introduces fuzzing as a process, goes through commercial tools, and explains what the customer requirements are for fuzzing. The advancement of evolutionary fuzzing tools, including American Fuzzy Lop (AFL) and the emerging full fuzz test automation systems are explored in this edition. Traditional software programmers and testers will learn how to make fuzzing a standard practice that integrates seamlessly with all development activities. It surveys all popular commercial fuzzing tools and explains how to select the right one for software development projects.nnThis book is a powerful new tool to build secure, high-quality software taking a weapon from the malicious hacker's arsenal. This practical resource helps engineers find and patch flaws in software before harmful viruses, worms, and Trojans can use these vulnerabilities to rampage systems. The book shows how to make fuzzing a standard practice that integrates seamlessly with all development activities.  |c Publisher abstract. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer software  |x Development. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computer software  |x Development  |2 fast 
700 1 |a Takanen, Ari,  |e author. 
700 1 |a DeMott, Jared,  |e author. 
700 1 |a Miller, Charles,  |d 1951-  |e author. 
700 1 |a Kettunen, Atte,  |e author. 
776 0 8 |i Print version:  |t Fuzzing for software security testing and quality assurance.  |b Second edition.  |d Norwood, MA : Artech House, [2018]  |z 1608078507  |w (OCoLC)1005685377 
830 0 |a Artech House information security and privacy series. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1825934  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36384991 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5430720 
938 |a EBSCOhost  |b EBSC  |n 1825934 
938 |a IEEE  |b IEEE  |n 9100404 
938 |a YBP Library Services  |b YANK  |n 15503380 
994 |a 92  |b IZTAP