GeistHaus
log in · sign up

GitHub - google/oss-fuzz: OSS-Fuzz - continuous fuzzing for open source software.

github.com

OSS-Fuzz - continuous fuzzing for open source software. - google/oss-fuzz

47 pages link to this URL
The Core Issue: Keeping Bitcoin Core Secure

From The Core Issue: a look at how Bitcoin Core handles security vulnerability disclosures, testing for bugs, and patching them.

0 inbound links article en FEATUREDPRINTTECHNICAL The Core IssueBitcoin Core
Timeless Debugging of Complex Software

In software security, root cause analysis (RCA) is the process used to “remove the mystery” from irregular software execution and measure the security impact...

2 inbound links article en vulnerability researchreverse engineeringbinary exploitationprogram analysiscomputer securitycyber securitysecurity educationwargames
ArduinoJson: Efficient JSON serialization for embedded C++

ArduinoJson is a JSON library for Arduino, IoT, and any embedded C++ project. It supports JSON serialization, JSON deserialization, MessagePack, streams, and fixed memory allocation. It has a simple API, it’s easy to use, and it’s trusted by thousands of developpers all over the world.

0 inbound links website en JSONC++ArduinoIoTembedded
libvips

A fast image processing library with low memory needs.

Introducing the 2025 AI puzzle competition

After a long hiatus, I'm back to blogging. I'm preparing a comparison of different LLMs on different puzzles. I'm testing LLMs from OpenAI, Google, and so on. In this post, I just lay out the rules of the competition and introduce the scaffolding that I used.

0 inbound links article en
Ring Around The Regex: Lessons learned from fuzzing regex libraries (Part 1)

Okay, if you’re reading this, you probably know what fuzzing is. As an incredibly reductive summary: fuzzing is an automated, random testing process which tries to explore the state space (e.g., different interpretations of the input or behaviour) of a program under test (PUT; sometimes also SUT, DUT, etc.). Fuzzing is often celebrated as one of the most effective ways to find bugs in programs due to its inherently random nature, which defies human expectation or bias1. The strategy has found countless security-critical bugs (think tens or hundreds of thousands) over its 30-odd-years of existence, and yet faces regular suspicion from industry and academia alike. Mostly. Fuzzers can be overfit to certain applications, intentionally or not. ↩

5 inbound links article en
Mongoose: Preauth RCE and mTLS Bypass on Millions of Devices | evilsocket

So, Mongoose. If you’ve never heard of it, you’ve almost certainly used a device that runs it. It’s a single-file, cross-platform embedded network library writ…

0 inbound links article en Cybersecurity rceexploitresponsible disclosurevulnerability researchcvetlsembedded devicesiot securitysecurityiotmongoosecesantaembeddedmipsmtlsmdnsbuffer overflowheap overflowstack overflowauthentication bypassindustrial controlCVE-2026-5244CVE-2026-5245CVE-2026-5246
c-ares: a modern asynchronous DNS resolver

c-ares is a modern DNS (stub) resolver library, written in C. It provides interfaces for asynchronous queries while trying to abstract the intricacies of the underlying DNS protocol. It was originally intended for applications which need to perform DNS queries without blocking, or need to perform multiple DNS queries in parallel.

0 inbound links website en
Two kinds of testing

While talking about thinking about tests and testing in software engineering recently, I’ve come to the conclusion that there are (at least) two major ideas and goals that people have when they test or talk about testing. This post aims to outline what I see as these two schools, and explore some reasons engineers coming from these different perspectives can risk talking past each other. Two reasons to test Testing for correctness The first school of testing comprises those who see testing as a tool for validating a software artifact against some externally-defined standard of correctness.

0 inbound links article en post CC BY 4.0
c-ares: a modern asynchronous DNS resolver

c-ares is a modern DNS (stub) resolver library, written in C. It provides interfaces for asynchronous queries while trying to abstract the intricacies of the underlying DNS protocol. It was originally intended for applications which need to perform DNS queries without blocking, or need to perform multiple DNS queries in parallel.

0 inbound links website en