How does fuzzing work?
Check for software vulnerabilities through dynamic testing:
Name the three different classes of fuzzing
What different input generation techniques are there?
How does execution monitoring work?
When does a fuzz test violate security policy?