Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automatically

1 min read Original article ↗