Abstract
The first bug we found, we sent it to Open Office, they solved it, and they solved it in their own way, but if you have exactly 65K characters, then you will undoubtedly have the same problem, and that’s basically Sandy’s talk about the honeymoon effect1. Finally it was solved. The other interesting thing about this is, we tried it with Writer (which is the Microsoft Word of Open Office), and Writer handled it correctly, so I asked the Open Office people, well did you have a problem with the Writer, and they said, well yes, we did have this vulnerability with the Writer, but we have fixed it. So conceptually they should have done it for the other applications as well because they are the same, and this is again about the honeymoon effect, you just need one “+4”, such as this, and check it with the pertinent applications.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aloteibi, S. (2014). On the Value of Hybrid Security Testing (Transcript of Discussion). In: Christianson, B., Malcolm, J. (eds) Security Protocols XVIII. Security Protocols 2010. Lecture Notes in Computer Science, vol 7061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45921-8_31
Download citation
DOI: https://doi.org/10.1007/978-3-662-45921-8_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45920-1
Online ISBN: 978-3-662-45921-8
eBook Packages: Computer ScienceComputer Science (R0)