Jump to content

Wikipedia:Articles for deletion/American fuzzy lop (fuzzer)

From Wikipedia, the free encyclopedia
The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

The result was keep. (non-admin closure) sovereign°sentinel (contribs) 08:35, 2 September 2015 (UTC)[reply]

American fuzzy lop (fuzzer) (edit | talk | history | protect | delete | links | watch | logs | views) – (View log · Stats)
(Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

One paper doesn't make this program pass WP:GNG. I couldn't find any other non-blog secondary sources. shoy (reactions) 20:20, 17 August 2015 (UTC)[reply]

@Dsimic and Davey2010: I added more references that point to serious security bugs and proofs that those were found with the aid of afl-fuzz. Those bugs were found in FLOSS programs used by millions of people and if they were not found and reported, somebody else could find them in a different way and instead of leading to fixing them, those could be weaponized. I believe that afl-fuzz greatly contributed to the current state of information security. Deetah (talk) 15:26, 23 August 2015 (UTC)[reply]
Please try to expand the article beyond its current state of a very short stub. That might help, as it would demonstrate that the provided references contain enough relevant material. — Dsimic (talk | contribs) 15:46, 23 August 2015 (UTC)[reply]
@Dsimic: I understand that the article would be removed tomorrow if the voting goes against it - could I get more time for that? — Preceding unsigned comment added by Deetah (talkcontribs) 19:31, 23 August 2015 (UTC)[reply]
Sure thing, no discussions of this type are closed by bots, people instead read them and conclude the outcomes. Thus, if you're asking for more time, there are no reasons not to have it. — Dsimic (talk | contribs) 20:00, 23 August 2015 (UTC)[reply]
@Deetah: You may also use this Black Hat presentation (see page 44) as a rather good reference, which also brings the notability up one notch. — Dsimic (talk | contribs) 13:17, 25 August 2015 (UTC)[reply]
@Dsimic: Thank you! I included this in the article. Deetah (talk) 14:09, 25 August 2015 (UTC)[reply]
Ok, great. Your next steps should be to add more content/wording to the article, and to convert already existing external links into references. — Dsimic (talk | contribs) 14:12, 25 August 2015 (UTC)[reply]
Note: This debate has been included in the list of Software-related deletion discussions. North America1000 23:16, 17 August 2015 (UTC)[reply]
Note: This debate has been included in the list of Computing-related deletion discussions. North America1000 23:16, 17 August 2015 (UTC)[reply]
Relisted to generate a more thorough discussion and clearer consensus.
Relisting comment: relisting per author's request for additional time to improve the article Swarm 06:42, 25 August 2015 (UTC)[reply]
Please add new comments below this notice. Thanks, Swarm 06:42, 25 August 2015 (UTC)[reply]
  • Keep - I added more references, including more serious CVE bugs, a Black Hat presentation and French infosec-related magazine and underlined the size of the community. Also, I expanded the article beyond its stubby version and added a screenshot. Deetah (talk) 20:25, 27 August 2015 (UTC) You only get to !vote once shoy (reactions) 12:39, 28 August 2015 (UTC)[reply]
Sorry, thought that after relisting I should cast my vote again. Deetah (talk) 15:42, 28 August 2015 (UTC)[reply]
  • Keep - Idea is to be encyclopedic and not social media, where censorship is more rampant. — Preceding unsigned comment added by Debasish Dey (talkcontribs) 22:08, 27 August 2015 (UTC)[reply]
  • Keep - The article has been significantly improved since this discussion was opened. Dozens of official security announcements (maybe more) by widely used projects (i.e. millions of users, or billions in the case of some like sqlite - which has integrated support for it the testing harness) with credit given to AFL for finding the vulnerabilities is a strong indication of notability. The information is certainly verifiable. At a minimum it's covered by an infosec magazine and lwn.net, which is a very reliable publication with strong editorial oversight rather than a tech blog. There are multiple academic papers analysing it or making use of it. 99.231.115.244 (talk) 19:45, 30 August 2015 (UTC)[reply]
  • Weak Keep - Current references seem rather specialized, and the text is really reaching a bit in places (census of the mailing list...?), but I would judge there's a borderline notability demonstration. Wouldn't say no to a merge with Fuzz testing though. -- Elmidae (talk) 19:05, 1 September 2015 (UTC)[reply]
@Elmidae: actually, the post was there just to connect the CVEs to the author. On the other hand, the CVE pages already reference afl-fuzz in links inside the report, so perhaps this particular reference can just be removed. Deetah (talk) 21:52, 1 September 2015 (UTC)[reply]
@Elmidae: Regarding the nature of references, we can expect only highly specialized ones simply because that's the nature of american fuzzy lop itself. It should be a while before it's covered in more popular media, but that shouldn't affect the fact that it's already notable enough to deserve a separate article. — Dsimic (talk | contribs) 23:00, 1 September 2015 (UTC)[reply]
The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.