Skip to content

How to Secure C and C++ Code

Explore how C/C++ code can be secured using an advanced security technique — white-box fuzz testing.

TRUSTED BY
google-2015-3Deutsche_Telekom_2022 1-3bosch-logo-simple 1-2Secunet_Security_Networks_Logo-2Continental_AG_logo 1-2Cariad_Logo-2ETAS-Logo-2

Get the Free White Paper

COVER CC++ WHITE PAPER

C and C++ are notorious for being bug-prone. In fact, one in four issues of the Top 25 Most Dangerous Software Weaknesses is related to C or C++. 


Inside this white paper, you’ll find:

  • How companies secure C/C++ today
  • How fuzzing helps with C/C++ security
  • How to trigger memory corruptions with white-box fuzzers.

Screenshot at Mar 28 09-31-10

 

“Fuzz testing is state-of-the-art for testing robustness. Although you can write your own tests, you can never perform as many random and denial-of-service tests as you can with fuzzing. You must perform fuzz testing to prove to the FDA that your device is reliable and that the most common bugs are caught.”
Verana Wieser
Verena WieserMedical Device Consultant, Lorit Consultancy