Young hacker smiling
Pickled cucumbers

Gherkin on steroids

How to document detailed attack vectors
Quill icon Rafael Ballestas   Folder icon documentation   Tag icon documentation,  vector,  software

In the field of information security and ethical hacking, finding all vulnerabilities is as important as reporting them as soon as possible. For that, we need an effective means to communicate with all stakeholders. We have proposed before using the bussiness-readable, domain-specific language Gherkin. In that...



Cucumber slices

Is your app in a pickle?

Documenting vulnerabilities with gherkin
Quill icon Rafael Ballestas   Folder icon documentation   Tag icon documentation,  vector,  software

Gherkin is a simple language that can be used for software documentation and testing. It can be thought of as a tool for communication between stakeholders and developers which helps minimize misunderstandings and regressions through precision in the definition of use-case scenarios. Figure 1. Behaviour-driven...



Doll using a magnifying glass while searching through a set of data

Symbolic execution for mortals

What is it and how it works
Quill icon Juan Aguirre   Folder icon attacks   Tag icon security,  test,  software

In 2003 the Defense Advanced Research Projects Agency, DARPA, announced the Cyber Grand Challenge, a two-year competition seeking to create automatic systems for vulnerability detection, exploitation, and patching in near real-time which brought quite a big and complex task to the table. With this task symbolic...



Service status - Terms of Use