- Shift Left Academy
Computational systems are increasingly ubiquitous, networked, and subject to attack. The rise of cyber-attacks has spurred research and development of cyber-defensive tools.
The corresponding ability to evaluate cyber-defensive tools both in general and in specific operational scenarios is now needed. Existing cyber-defensive test suites are artificial, insufficient, static, and ad hoc.
This report details Bug Injector, which automates benchmark construction, and will permit more thorough and customized evaluation of commercial products and research results at a lower cost.