Twitter | Pretraživanje | |
László Szekeres
Securing C/C++ at Google.
18
Tweetovi
183
Pratim
110
Osobe koje vas prate
Tweetovi
László Szekeres 1. stu
Odgovor korisniku/ci @gannimo @cestlemieux
Thanks, Caroline! Yes, let me send an email including everyone.
Reply Retweet Označi sa "sviđa mi se"
László Szekeres proslijedio/la je tweet
Moshe Vardi 15. ruj
Reply Retweet Označi sa "sviđa mi se"
László Szekeres proslijedio/la je tweet
Fish in a Barrel 3. ruj
This account's primary purpose is to complain about memory unsafety, but what areas of research could make memory safe languages easier to adopt and even more safe? One of FiaB's principals tackles the topic:
Reply Retweet Označi sa "sviđa mi se"
László Szekeres 2. ruj
Really enjoyed last week and very excited and honored that our paper on test driver generation for received Best Paper Award of the industry track! See the paper here:
Reply Retweet Označi sa "sviđa mi se"
László Szekeres proslijedio/la je tweet
John Regehr 19. kol
new blog post: Write Fuzzable Code in which I express a lack of sympathy for anti-fuzzing measures
Reply Retweet Označi sa "sviđa mi se"
László Szekeres proslijedio/la je tweet
Tamás Görbe 5. kol
A Mathematician's Way* of Converting Miles to Kilometers • 1 mi ≈ 1.609 km • The ratio of consecutive Fibonacci numbers Fₙ₊₁/Fₙ tends to the golden ratio φ ≈ 1.618 as n increases So Fₙ mi ≈ Fₙ₊₁ km *This is how I do it 😅
Reply Retweet Označi sa "sviđa mi se"
László Szekeres 7. kol
Odgovor korisniku/ci @johnregehr
You might also be interested in our recent paper in this area:
Reply Retweet Označi sa "sviđa mi se"
László Szekeres proslijedio/la je tweet
ESEC/FSE 2019 6. kol
is happy to feature the industry paper "FUDGE: Fuzz Driver Generation at Scale" by Domagoj Babić, Stefan Bucur, Yaohui Chen, Franjo Ivančić, Tim King, Markus Kusano, Caroline Lemieux, László Szekeres, and Wei Wang. Moreat . ,
Reply Retweet Označi sa "sviđa mi se"
László Szekeres 5. kol
Odgovor korisniku/ci @ctreude @ESEM_conf @UniofAdelaide
Nice! Congrats! You might be interested in our recent paper in the area:
Reply Retweet Označi sa "sviđa mi se"
László Szekeres 28. srp
Odgovor korisniku/ci @johnregehr
Write unit testable code. Whenever it makes sense, in addition to unit testing an interface, also fuzz it.
Reply Retweet Označi sa "sviđa mi se"
László Szekeres proslijedio/la je tweet
Max Moroz 25. srp
The legendary AFL fuzzer developed by is now on GitHub:
Reply Retweet Označi sa "sviđa mi se"
László Szekeres 15. srp
Odgovor korisniku/ci @cestlemieux
We are very grateful too for your great contributions! :)
Reply Retweet Označi sa "sviđa mi se"
László Szekeres 15. srp
Fuzz Driver Generation at Scale! Check out the preprint of our paper at: work w/ D. Babic, , Y. Chen, , T. King, M. Kusano, , W. Wang. See you at in August!
Reply Retweet Označi sa "sviđa mi se"
László Szekeres 11. lip
Odgovor korisniku/ci @cestlemieux
Nice work! BTW I just missed you guys, I was there for but left after that :/
Reply Retweet Označi sa "sviđa mi se"
László Szekeres 2. tra
Odgovor korisniku/ci @tdierks
🇭🇺Hungarian: Feed the goat and keep the cabbage too.
Reply Retweet Označi sa "sviđa mi se"
László Szekeres proslijedio/la je tweet
Google Open Source 9. sij 2019.
Are you fuzzing? OSS-Fuzz, free continuous fuzzing infrastructure that we offer to open source projects, has discovered 9,000 bugs since December 2016! Help us make open source more secure: apply to integrate your project.
Reply Retweet Označi sa "sviđa mi se"
László Szekeres 30. stu 2018.
Odgovor korisniku/ci @szomszedos
Klassz járgány!
Reply Retweet Označi sa "sviđa mi se"
László Szekeres 7. stu 2018.
Odgovor korisniku/ci @NedWilliamson @Dor3s @Google
Yes! We are working on automated fuzz target generation to help bring the benefits of fuzz testing to more projects. These targets exercise libraries similarly to typical client code in other projects. This increases the likelihood of finding bugs that OSS developers care to fix.
Reply Retweet Označi sa "sviđa mi se"