Fuzzing Tool

Coordinated by
Gradiant

Fuzzing Tool will test System Under Test (SUT) security vulnerabilities or inputs not contemplated that could compromise the system; as a black-box process, by using unintended or incorrect inputs and monitoring their corresponding outputs.

Description

Describe the innovation content of the result:
Allows developers or security experts the existence of weaknesses or inputs not contemplated that could compromise the system by sending different inputs requests and monitoring the outputs specified by their swagger file.
Who will be the customer?
Software developers or security experts who want to achieve a more complete security assessment.
What benefit will it bring to the customers?
Prevent possible weaknesses not covered in previous vulnerability assessments, allowing to take measures against them.
When is the expected date of achievement in the project (Mth/yr)?
February 2023
When is the time to market (Mth/yr)?
2-3 years
What are the costs to be incurred after the project and before exploitation?
1-2 M€
What is the approximate price range of this result/price of licences?
~1.000€
What are the market size in Millions € for this result and relevant trend?
2.500 M€
How will this result rank against competing products in terms of price/performance?
To be determined
Who are the competitors for this result?
Checkmarxk, Micro Focus, Veracode, Synopsys
How fast and in what ways will the competition respond to this result?
To be determined
Who are the partners involved in the result?
N/A
Who are the industrial partners interested in the result (partners, sponsors, etc.)?
N/A
Have you protected or will you protect this result? How? When?
IP rights for source code are reserved. The source code will not be publicly available. In addition, the result is not stored in this tool, it is transferred to the MUD file.

Other results

Security evaluation methodology

Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…

Extended MUD file

The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…

Monitoring Tool

The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.

Security Testing Tool

GdpR-based cOmbinatOrial Testing (GROOT) is a general combinatorial strategy for testing systems managing GDPR’s concepts (e.g., Data Subject, Personal Data or Controller).

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This