BEGIN:VCALENDAR
PRODID;X-RICAL-TZSOURCE=TZINFO:-//com.denhaven2/NONSGML ri_cal gem//EN
CALSCALE:GREGORIAN
VERSION:2.0
BEGIN:VTIMEZONE
TZID;X-RICAL-TZSOURCE=TZINFO:Europe/Berlin
BEGIN:DAYLIGHT
DTSTART:20190331T020000
RDATE:20190331T020000
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20190907T150500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20190907T143500
DTSTAMP;VALUE=DATE-TIME:20190822T112033Z
UID:85a644d0-bf0c-4690-ae31-91435acebdf0@localhost
DESCRIPTION:Writing secure code that deals with potentially untrusted dat
 a (parsers\, importers\, etc) is always hard since there are many potent
 ial cases to take into account.\n\nOne of the techniques used to improve
  the security of such code is fuzzing.\n\nFuzzing involves providing inv
 alid or random data to a given piece of code to test its behaviour.\n\nM
 odern fuzzers are smart enough to understand what needs to be changed in
  the input to make the code go through a different code path making test
 ing faster and more complete.\n\noss-fuzz is a Free set of tools to make
  fuzzing of C/C++ code easier.\nIt is comprised of various scripts and d
 ocker images\, which\, for example\, have the base system libraries alre
 ady compiled with the sanitizers.\n\nCoupling a fuzzer with the compiler
  sanitizers (asan\, ubsan\, msan) gives even better results since these 
 sanitizers will make sure the code is run more strictly.\n\nIn this sess
 ion we'll show how to fuzz a C++ codebase\, as well as give you an updat
 e on how we're using these tools.
URL:https://conf.kde.org/en/akademy2019/public/events/113.html
SUMMARY:Testing your code for security issues with automated fuzzing
ORGANIZER:akademy2019_
LOCATION:akademy2019_ - U4-01
END:VEVENT
END:VCALENDAR
