Securing next generation networks by fuzzing protocol implementations

2011 
Telecom networks are increasingly synonymous with the Internet and mobile phones resemble computers in all aspects, except the level of protection. By fuzzing protocol implementations before deployment, critical vulnerabilities can be found and fixed making networks and devices more robust against attacks.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    4
    References
    1
    Citations
    NaN
    KQI
    []