{"id":87149,"date":"2019-01-29T09:42:23","date_gmt":"2019-01-29T17:42:23","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/01\/mayhem-the-machine-that-finds-software-vulnerabilities-then-patches-them"},"modified":"2019-01-29T09:42:23","modified_gmt":"2019-01-29T17:42:23","slug":"mayhem-the-machine-that-finds-software-vulnerabilities-then-patches-them","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/01\/mayhem-the-machine-that-finds-software-vulnerabilities-then-patches-them","title":{"rendered":"Mayhem, the Machine That Finds Software Vulnerabilities, Then Patches Them"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/mayhem-the-machine-that-finds-software-vulnerabilities-then-patches-them2.jpeg\"><\/a><\/p>\n<p>Bug and vulnerability hunting is a big business and the need for it is getting larger and larger. Up until this point, the majority of work had been from people. Either as hackers discovered holes and released exploits or as companies paid people to do the testing.<\/p>\n<hr>\n<p>The machine triumphed in DARPA\u2019s Cyber Grand Challenge, where teams automated white-hat hacking.<\/p>\n<p><!-- Link: <a href=\"https:\/\/spectrum.ieee.org\/computing\/software\/mayhem-the-machine-that-finds-software-vulnerabilities-then-patches-them\">https:\/\/spectrum.ieee.org\/computing\/software\/mayhem-the-mach...tches-them<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bug and vulnerability hunting is a big business and the need for it is getting larger and larger. Up until this point, the majority of work had been from people. Either as hackers discovered holes and released exploits or as companies paid people to do the testing. The machine triumphed in DARPA\u2019s Cyber Grand Challenge, [\u2026]<\/p>\n","protected":false},"author":509,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43,34,6],"tags":[],"class_list":["post-87149","post","type-post","status-publish","format-standard","hentry","category-business","category-cybercrime-malcode","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/87149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/509"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=87149"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/87149\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=87149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=87149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=87149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}