“Back then, we noticed that fuzzing and some other techniques are super powerful, but outside of the security research community, no one actually used it,” Dechand told me. “We started to collaborate ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results