Subject: Re: [boost] Formal Review of IO and Toolbox extensions to Boost.GIL starts TOMORROW
From: Christian Henning (chhenning_at_[hidden])
Date: 2010-12-06 13:11:35
> Have you looked into how browsers test against malicious attacks?
> IIRC they take valid images and change them in a "educatedly random"
> fashion. (i.e. all kinds of header corruption)
> As images are a common attack vector for malicious attacks I think that kind
> of testing is quite important.
I think you bring up a valid point. I'll make an entry in the todo
list to add some invalid reads. Now how do I create a good cross
selection of invalid jpeg, tiff, png, bmp, and pnm images? I'm open
Boost list run by bdawes at acm.org, gregod at cs.rpi.edu, cpdaniel at pacbell.net, john at johnmaddock.co.uk