Pentests using LLMs
2024-10-25 , Europe - Main Room

Using LLMs and other ML tools for attack surface discovery and pentesting.


Conjunction of LLMs and GANs in cybersecurity: network, OSINT, social engineering. Active probing techniques. Relation to LLM-based coding, TDD, test oracles, fuzzing. Next steps: adversarial SUT replication, humans as weakness, arms race dilemma.

See also: Talk slides (473.7 KB)

Entrepreneur and Philanthropist Pioneering Global Computer Literacy and Privacy Advocacy