We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

May the Fuzz be with you

00:00

Formal Metadata

Title
May the Fuzz be with you
Title of Series
Number of Parts
132
Author
License
CC Attribution - NonCommercial - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
This talk will explore how Long short-term memory (LSTM) recurrent neural networks combined with Python can use Artificial Intelligence to provide invalid, unexpected, or random data as inputs for testing software and finding network security vulnerabilities. The technique of machine generated test inputs is an established testing approach and is sometimes referred to as fuzzing. I will take this idea further by presenting how various types of machine learning can provide novel outlier test cases to harden software and networks in a way that is superior to using only randomness. Instead, I will discuss how to train neural networks to produce better fuzzing data.This is a natural progression from my work with machine learning and image processing using support vector machines (SVM) and Generative Adversarial Networks (GAN) which I have applied to this new domain of software testing. This a beginner level talk aimed at all software developers and testers with a goal to giving attendees a basic understanding of fuzz testing. Timing of presentation 1 Introduction 0-5 minutes 2 What is a neural fuzzing 5-10 minutes 3 How does fuzzing work 10-15 minutes 4 Steps to train a deep neural network 15-20 minutes 5 Implementing a basic LSTM neural network for security testing 20-25 minutes 6 Conclusion and Questions 25-30 minutes
AnalogyFuzzy logicData structureoutputLogic gateInstance (computer science)Electric generatorPhysical systemMedical imagingPointer (computer programming)Multiplication signArtificial neural networkRandomizationVulnerability (computing)SoftwareBuffer overflowSinc functionException handlingIntelligent NetworkComputer filePatch (Unix)Information securitySoftware bugWordCASE <Informatik>Statistical hypothesis testingPoint (geometry)Real numberVirtual machineWeb portalStatistical hypothesis testingFuzzy logicCategory of beingBeta functionObject (grammar)Resampling (statistics)Fuzzy logicClient (computing)ComputerResultantComputer programVideo gameSet (mathematics)Cycle (graph theory)Crash (computing)Expert systemGradientBitCybersexGoodness of fitBuffer solutionComputer animation
Fuzzy logicCellular automatonType theorySoftwareFuzzy logicoutputStatistical hypothesis testingPlastikkarteFile formatCASE <Informatik>Statistical hypothesis testingComputer networkLogic gateComputer networkRekursives neuronales NetzInformationRecurrence relationShape (magazine)Information securityChainArtificial neural networkSoftwarePatch (Unix)Electronic mailing listoutputType theoryAnalogySoftware bugRule of inferenceInstance (computer science)CASE <Informatik>NumberCartesian coordinate systemMereologyFuzzy logicStatistical hypothesis testingRow (database)Statistical hypothesis testingFile formatSequenceMultiplication signLoop (music)Process (computing)InformationCuboidResultantDampingComputer networkMessage passingScanning tunneling microscopeRandomizationRecurrence relationSemiconductor memoryPower (physics)ProgrammschleifeContext awarenessComputer programConnected spaceView (database)State of matterElectric generatorTerm (mathematics)Library (computing)TheoryFunctional (mathematics)Speech synthesisPoint (geometry)Fuzzy logicWordFormal languageVulnerability (computing)MassCrash (computing)Computer networkPlastikkarteDivisorComputer animation
Computer networkTerm (mathematics)Default (computer science)Form (programming)InformationSemiconductor memoryModule (mathematics)Cellular automatonKey (cryptography)Computer animation
Artificial neural networkUniformer RaumRandom numberModul <Datentyp>outputFunction (mathematics)Structural loadMenu (computing)Link (knot theory)QuadrilateralConfiguration spaceLTI system theoryTable (information)BitCellular automatonInformationLogic gateLine (geometry)MultiplicationMultiplication signWordState of matteroutputComputer networkNumberCodeRow (database)ImplementationDecision theoryEndliche ModelltheorieOperator (mathematics)Formal languageData storage deviceChainSequenceKey (cryptography)Game controllerCASE <Informatik>RandomizationInteractive televisionSet (mathematics)Data structureSupport vector machineMereologyLevel (video gaming)Network topologyStatistical hypothesis testingArtificial neural networkExecution unitElectric generatorParameter (computer programming)Similarity (geometry)Primality testInstance (computer science)Computer animation
Transcript: English(auto-generated)