2024-10-25 –, Europe - Main Room
Using LLMs and other ML tools for attack surface discovery and pentesting.
Conjunction of LLMs and GANs in cybersecurity: network, OSINT, social engineering. Active probing techniques. Relation to LLM-based coding, TDD, test oracles, fuzzing. Next steps: adversarial SUT replication, humans as weakness, arms race dilemma.
Entrepreneur and Philanthropist Pioneering Global Computer Literacy and Privacy Advocacy