Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

On the contrary, for years, the most prolific fuzzers basically did just generate random bitstreams, and that technique will still find vulnerabilities in all the memory-unsafe software that hasn't been fished out by those same dumb fuzzers.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: