Abstract:
Technologies are described herein for performing targeted, black-box fuzzing of input data for application testing. A dataflow tracing module traces an application while it reads and processes a set of template data to produce operation mapping data that maps data locations in the template data to operations performed by the application in processing the data at the location. The tracing is performed without requiring the application source code, knowledge of the syntactical structure of the input data, or specially instrumented binaries for the application. A fuzzing module is then utilized to target a specific operation or operations in the application by fuzzing data locations within the template data according to the operation mapping data until the desired outcome is achieved.
Abstract:
Technologies are described herein for performing targeted, black-box fuzzing of input data for application testing. A dataflow tracing module traces an application while it reads and processes a set of template data to produce operation mapping data that maps data locations in the template data to operations performed by the application in processing the data at the location. The tracing is performed without requiring the application source code, knowledge of the syntactical structure of the input data, or specially instrumented binaries for the application. A fuzzing module is then utilized to target a specific operation or operations in the application by fuzzing data locations within the template data according to the operation mapping data until the desired outcome is achieved.
Abstract:
The subject disclosure is directed towards detecting software vulnerabilities in an isolated computing environment. In order to evaluate each input submission from an external computer, a plurality of tasks are automatically generated for execution on one or more computing units running within the isolated computing environment. Various configurations of the one or more computing units are defined in which each computing unit executes the plurality of tasks. A report is produced comprising results associated with such an execution.
Abstract:
The subject disclosure is directed towards detecting software vulnerabilities in an isolated computing environment. In order to evaluate each input submission from an external computer, a plurality of tasks are automatically generated for execution on one or more computing units running within the isolated computing environment. Various configurations of the one or more computing units are defined in which each computing unit executes the plurality of tasks. A report is produced comprising results associated with such an execution.
Abstract:
Optical fiber preforms which can be drawn into optical fibers of desired dimensions are fabricated by applying a vacuum to a cladding tube and drawing molten glass from a crucible into a bore of the cladding tube while a portion of the cladding tube is within a furnace preferably through a small hole in the top of the furnace. The method and apparatus are particularly applicable to highly non-linear fiber (HNLF) glasses and highly doped or rare earth glasses since materials therein are generally expensive and only a small quantity of molten glass is required but can be applied to virtually any optical fiber construction where the core glass has a lower melting or softening point than that of the cladding tube. Sources of contamination, breakage and other preform defects are substantially avoided and toxic substances, if present are readily confined.