|
Boost : |
Subject: Re: [boost] Formal Review of IO and Toolbox extensions to Boost.GIL starts TOMORROW
From: Christian Henning (chhenning_at_[hidden])
Date: 2010-12-06 13:11:35
Hi Fabio,
>
> Have you looked into how browsers test against malicious attacks?
> IIRC they take valid images and change them in a "educatedly random"
> fashion. (i.e. all kinds of header corruption)
> As images are a common attack vector for malicious attacks I think that kind
> of testing is quite important.
>
I think you bring up a valid point. I'll make an entry in the todo
list to add some invalid reads. Now how do I create a good cross
selection of invalid jpeg, tiff, png, bmp, and pnm images? I'm open
for suggestions.
Christian
Boost list run by bdawes at acm.org, gregod at cs.rpi.edu, cpdaniel at pacbell.net, john at johnmaddock.co.uk