“Back then, we noticed that fuzzing and some other techniques are super powerful, but outside of the security research community, no one actually used it,” Dechand told me. “We started to collaborate ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results