Conf42 DevSecOps 2025 - Online

- premiere 5PM GMT

Do Threat Models Dream of Fuzzing Apps?

Abstract

we’re introducing a new technique that uses existing tools in a novel way: using a threat model as a configuration file for continuous, adaptive pentesting:

  • parse model, get attack surface, risks.
  • create scanner inputs for ZAP, Nuclei, and fuzzers.
  • Scan
  • Filters results
  • Report
...

Spyros Gasteratos

Founder @ Smithy.security

Spyros Gasteratos's LinkedIn account



Join the community!

Learn for free, join the best tech learning community

Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Access to all content