Uninformed: Informative Information for the Uninformed

Vol 6» 2007.Jan



Case Studies

This chapter describes three separate vulnerabilities that were found by the authors in real world 802.11 wireless device drivers. These three issues were found through a combination of fuzzing and manual analysis.



Subsections