Skip to main content

On the Value of Hybrid Security Testing (Transcript of Discussion)

  • Conference paper
  • 384 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7061))

Abstract

The first bug we found, we sent it to Open Office, they solved it, and they solved it in their own way, but if you have exactly 65K characters, then you will undoubtedly have the same problem, and that’s basically Sandy’s talk about the honeymoon effect1. Finally it was solved. The other interesting thing about this is, we tried it with Writer (which is the Microsoft Word of Open Office), and Writer handled it correctly, so I asked the Open Office people, well did you have a problem with the Writer, and they said, well yes, we did have this vulnerability with the Writer, but we have fixed it. So conceptually they should have done it for the other applications as well because they are the same, and this is again about the honeymoon effect, you just need one “+4”, such as this, and check it with the pertinent applications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aloteibi, S. (2014). On the Value of Hybrid Security Testing (Transcript of Discussion). In: Christianson, B., Malcolm, J. (eds) Security Protocols XVIII. Security Protocols 2010. Lecture Notes in Computer Science, vol 7061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45921-8_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45921-8_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45920-1

  • Online ISBN: 978-3-662-45921-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics