$include_dir="/home/hyper-archives/boost/include"; include("$include_dir/msg-header.inc") ?>
Subject: Re: [boost] Formal Review of IO and Toolbox extensions to Boost.GIL starts TOMORROW
From: Christian Henning (chhenning_at_[hidden])
Date: 2010-12-06 13:11:35
Hi Fabio,
>
> Have you looked into how browsers test against malicious attacks?
> IIRC they take valid images and change them in a "educatedly random"
> fashion. (i.e. all kinds of header corruption)
> As images are a common attack vector for malicious attacks I think that kind
> of testing is quite important.
>
I think you bring up a valid point. I'll make an entry in the todo
list to add some invalid reads. Now how do I create a good cross
selection of invalid jpeg, tiff, png, bmp, and pnm images? I'm open
for suggestions.
Christian