| Fuzz testing is a quality assurance technique used to discover coding errors and security loopholes in software, operating systems or networks. It involves inputting massive amounts of random data, called fuzz, to simulate an attack and make the test subject crash. If a vulnerability is found, a software tool called a fuzzer can be used to determine the potential cause of the crash. Fuzz testing was originally developed by Barton Miller at the University of Wisconsin in 1989. Fuzzers works best to detect vulnerabilities that can be exploited with buffer overflow, cross-site scripting, denial of service attacks, format bugs and SQL injection attacks. Fuzz testing is less effective for dealing with security threats that do not cause program crashes, such as spyware, some viruses, worms, Trojans and keyloggers. Although fuzz testing is simple, it offers a high benefit-to-cost ratio because it often reveals defects that are overlooked when software is written and debugged. This type of test usually finds only the most serious faults and is not useful for creating a complete picture of the overall security, quality or effectiveness of a program in a particular situation or application. Instead, it works best when used in conjunction with extensive black box testing, beta testing and other proven debugging methods. |
| | | Stay In Touch | | FOLLOW US |   | | CONTACT AN EDITOR |  | For feedback about any of our articles or to send us your article ideas, please contact us at: mrouse@techtarget.com | | |
No comments:
Post a Comment