Security Researcher CYCURA INC.
SANS GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), Offensive Security Certified Professional (OSCP) and Offensive Security Certified Expert (OSCE) with 5 years of penetration testing experience and a comprehensive background in C/C++ programming, reverse engineering, and general network and infrastructure security. Currently developing security tools including Open Web Application Security Project (OWASP) and client-server infrastructure for a new approach to port knocking.
How to Fuzz like a Hacker
One of today’s security research pillar is fuzzing. For the last year a huge number of bug were found using this technique. However, the days where fuzzers were reporting hundreds of exploitable crashes are gone. To keep up with the changing landscape and ever-increasing complexity of applications, fuzzers must become more sophisticated and faster. They are evolving from “dumb”, random input generation techniques to intelligent tools using genetic algorithms and coverage-guided engines.
This presentation will focus on methods that can be applied to optimize the fuzzing process and makes it more efficient. It includes tools and strategies like: Address Sanitizer, different distribution strategies, instrumentation and hardware advantages (depends on architecture). All those examples will be presented based on the current open-source leader, AFL.
Are you the next cyber security superstar?
Ready for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
Sponsors & Partners
They help us make this conference possible.
Orange „brings you closer to what matters to you”.
This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.