@Unpublished{ talk:brucker:pentesting:2026,
  author     = {Achim D. Brucker},
  date       = {2026-04-25},
  title      = {When Pen Testing is Not Enough},
  eventtitle = {{BSides} {Exeter}},
  language   = {english},
  areas      = {security},
  venue      = {Exeter, UK},
  abstract   = {Were often told "don't roll your own crypto" or "don't
                build your own auth." Its great advice for most, but it
                begs the question: What about the people who have to build the
                stuff everyone else relies on? When youre developing the
                core libraries, kernels, or protocols that the rest of the
                world trusts, "best effort" security testing is simply not
                enough.
                
                Standard tools like fuzzing and static analysis (SAST) are
                world-class at finding bugs, but they are inherently reactive.
                They can tell you that you have a vulnerability, but they can
                never prove that you don't. This raises the question of what
                we canand shoulddo when we need to go beyond the
                "find-and-patch" cycle.
                
                In this talk, I will explain the ideas underlying widely used
                security testing techniques such as fuzzing and static
                analysis, examining their strengths and weaknesses. This will
                be contrasted with a plain-English look at how formal
                verificationwhich offers the promise of being
                "mathematically proven"allows us to show the absence of
                entire vulnerability classes. I will also discuss why
                "mathematically proven" isn't a silver bullet and address the
                practical limitations of verifying complex systems.
                
                If youve ever wondered how the foundations of the internet
                are secured, or if you are building a component where a single
                bug constitutes a catastrophic failure, this session will show
                you how to move beyond the "Whac-A-Mole" of bug hunting.},
}
 
