Learn More
AusCERT advisories from summer 1996 pushed him beyond point of no return by raising the question "More of this same kind, again?" Ever since he has been pestering AusCERT and vendors with bug reports too long to be read. Ari Takanen, a complementary reinforcement with NT networking and administration background, brings in his expertise and interests in the(More)
Standards in communication enable new test automation techniques for verification of reliability and security. Fuzzing is a negative software testing method that feeds a program, device or system with malformed and unexpected input data in order to find critical crash-level defects. The tests are targeted at remote interfaces, and will focus on finding(More)
Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with(More)
About the Authors Ari Takanen is an undergraduate student at the University of Oulu. He comes from an NT networking and administration background, but is now concentrating on vulnerability research. His goal is a master's degree in Information Engineering (MSEE). Meanwhile he is working as a research scientist at the Department of Electrical Engineering.(More)
For the purposes of this study, IMS specifications and public sources were analyzed using the general attack surface analysis methodology. These findings were verified and augmented by active scanning and passive analysis of the available real-world IMS test setups that were investigated during the project. As various tests and security probes were(More)
Software is bound to have security critical flaws, and no testing or code auditing can ensure that software is flawless. But software security testing requirements have improved radically during the past years, largely due to criticism from security conscious consumers and Enterprise customers. Whereas in the past, security flaws were taken for granted (and(More)
  • 1