{"id":32570,"date":"2017-07-17T14:44:43","date_gmt":"2017-07-17T18:44:43","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/kudelski-security-to-present-on-automated-testing-of-crypto-software-at-black-hat-usa-2017-pr-newswire-press-release.php"},"modified":"2017-07-17T14:44:43","modified_gmt":"2017-07-17T18:44:43","slug":"kudelski-security-to-present-on-automated-testing-of-crypto-software-at-black-hat-usa-2017-pr-newswire-press-release","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/kudelski-security-to-present-on-automated-testing-of-crypto-software-at-black-hat-usa-2017-pr-newswire-press-release.php","title":{"rendered":"Kudelski Security to Present on Automated Testing of Crypto Software at Black Hat USA 2017 &#8211; PR Newswire (press release)"},"content":{"rendered":"<p><p>    Experts from Kudelski Security will also dive into topics such    as cloud security and orchestration, managed attacker    deception, advanced threat intelligence, designing IoT security    and cryptography during a series of Debriefing Sessions hosted    at the Four Seasons Hotel.  <\/p>\n<p>    Aumasson and Romailler's presentation will focus on a new and    efficient approach to systematic testing of cryptographic    software: differential fuzzing. Unlike general purpose software    fuzzing such as afl, differential fuzzing doesn't aim to find    memory corruption bugs (although they might come as a    by-product), but to find logic bugs. Compared to test vectors,    differential fuzzing provides greater code coverage and    compared to formal verification, differential fuzzing is easier    to apply, both for testers and developers. Aumasson and    Romailler will present this session at both Black Hat and BSides LV. Romailler will also present it at    Crypto & Privacy Village within DEF CON    25.  <\/p>\n<p>    While at Black Hat 2017, Kudelski Security will also be hosting    a Crypto Challenge, a series of after show Debriefs Sessions    and a party at the House of Blues' Foundation Room within    Mandalay Bay. Details include:  <\/p>\n<p>    Media and analysts interested in meeting with Kudelski    executives at the show should contact <a href=\"mailto:kudelskipr@teamlewis.com\">kudelskipr@teamlewis.com<\/a>.  <\/p>\n<p>    About Kudelski SecurityKudelski Security is the    premier advisor and cybersecurity innovator for today's most    security-conscious organizations. Our long-term approach to    client partnerships enables us to continuously evaluate their    security posture to recommend solutions that reduce business    risk, maintain compliance and increase overall security    effectiveness. With clients that include Fortune 500    enterprises and government organizations in Europe and across    the United States, we    address the most complex environments through an unparalleled    set of solution capabilities including consulting, technology,    managed security services and custom innovation. For more    information, visit <a href=\"http:\/\/www.kudelskisecurity.com\" rel=\"nofollow\">http:\/\/www.kudelskisecurity.com<\/a>.  <\/p>\n<p>    Media Contact:John    Van Blaricum    Vice President, Global Marketing    Kudelski Security    +1 650 966 4320    <a href=\"mailto:john.vanblaricum@kudelskisecurity.com\">john.vanblaricum@kudelskisecurity.com<\/a>  <\/p>\n<\/p>\n<p>    View original content with multimedia:<a href=\"http:\/\/www.prnewswire.com\/news-releases\/kudelski-security-to-present-on-automated-testing-of-crypto-software-at-black-hat-usa-2017-300488871.html\" rel=\"nofollow\">http:\/\/www.prnewswire.com\/news-releases\/kudelski-security-to-present-on-automated-testing-of-crypto-software-at-black-hat-usa-2017-300488871.html<\/a>  <\/p>\n<p>    SOURCE Kudelski Security  <\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"gmBFGPy3po\"><p><a href=\"https:\/\/kudelskisecurity.com\/\">Home<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Home&#8221; &#8212; Kudelski Security\" src=\"https:\/\/kudelskisecurity.com\/embed\/#?secret=M2HpUG06KS#?secret=gmBFGPy3po\" data-secret=\"gmBFGPy3po\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.prnewswire.com\/news-releases\/kudelski-security-to-present-on-automated-testing-of-crypto-software-at-black-hat-usa-2017-300488871.html\" title=\"Kudelski Security to Present on Automated Testing of Crypto Software at Black Hat USA 2017 - PR Newswire (press release)\">Kudelski Security to Present on Automated Testing of Crypto Software at Black Hat USA 2017 - PR Newswire (press release)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Experts from Kudelski Security will also dive into topics such as cloud security and orchestration, managed attacker deception, advanced threat intelligence, designing IoT security and cryptography during a series of Debriefing Sessions hosted at the Four Seasons Hotel. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-32570","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32570"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32570"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32570\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}