AIResearch AIResearch
Back to articles
AI

Cybersecurity's New Tool: Testing What You Think Is Safe

A new security method starts by imagining future breaches and works backward to expose hidden vulnerabilities, turning assumptions into testable hypotheses that can prevent attacks before they happen.

AI Research
March 26, 2026
3 min read
Cybersecurity's New Tool: Testing What You Think Is Safe

In cybersecurity, organizations often rely on threat models that look backward, analyzing past attacks to defend against known threats. This reactive approach leaves them vulnerable to emerging risks like AI-driven fraud or supply-chain compromises that haven't yet materialized. A new framework called Future-Back Threat Modeling (FBTM) flips this script by starting with envisioned future threats and working backward to current safety assumptions, aiming to make defenses more proactive and resilient against uncertainties.

The core of FBTM is that security weaknesses often stem not from known threats but from unexamined assumptions about what is considered safe. The researchers found that by treating every control, policy, or belief as a hypothesis to be falsified, organizations can uncover hidden vulnerabilities before adversaries exploit them. This approach moves beyond traditional frameworks like STRIDE or NIST CSF, which project known attacker behavior forward, by instead using foresight to identify 'unknown unknowns'—threats that haven't been conceived yet but could arise from future developments like artificial intelligence or geopolitical disruptions.

Ology of FBTM involves a four-phase workflow that integrates foresight directly into threat modeling. In Phase I, teams gather intelligence from sources like adversarial simulations and trend reports to map future-state assumptions, classifying them as fragile or robust based on factors like global threats identified by ENISA. For example, assumptions might include the trustworthiness of software dependencies or the resilience of AI systems against data poisoning. Phase II reframes these assumptions into testable hypotheses, examining them through attacker-centric, asset-centric, and architecture-centric perspectives to model epistemic exposure. Validation in this phase uses s like deception environments, such as honeypots, to stress-test assumptions empirically.

From applying FBTM, as detailed in the paper, show its practical effectiveness through a case study on CVE-2025-64446, a vulnerability in FortiWeb systems. The researchers deployed a simulated honeypot that mimicked a FortiWeb management API, capturing unsolicited external traffic that matched exploitation patterns reported by SANS ISC. Telemetry data, illustrated in Figure 3, revealed requests with path-traversal sequences and user-agent strings consistent with active attacks, providing empirical evidence that supported the framework's assumptions about attacker behavior. This evidence was used to refine hypotheses and inform governance adjustments, demonstrating how FBTM turns abstract foresight into actionable insights that can preempt real-world breaches.

Of FBTM are significant for both security professionals and organizational leaders. By shifting from a compliance-focused mindset to a cognitive one, it encourages continuous learning and adaptation, making security a dynamic process rather than a static checklist. The framework embeds foresight into executive decision cycles, helping leaders prioritize risks based on systemic impact rather than novelty, which can lead to more strategic resource allocation. For everyday readers, this means organizations could become better at anticipating and mitigating threats like data breaches or cyberattacks before they cause harm, potentially enhancing trust in digital systems.

However, the paper acknowledges limitations to FBTM. Its effectiveness depends heavily on human judgment and the quality of input data, which may introduce biases in assumption selection or testing. Scalability is another , as applying epistemic stress-testing across large enterprises requires advanced tooling and coordination, areas that need further exploration. Empirical validation through longitudinal studies in sectors like finance or critical infrastructure is also needed to fully assess its long-term impact. Despite these constraints, FBTM offers a conceptual bridge between strategic foresight and practical security, providing a to make learning from uncertainty a deliberate part of defense strategies.

Original Source

Read the complete research paper

View on arXiv

About the Author

Guilherme A.

Guilherme A.

Former dentist (MD) from Brazil, 41 years old, husband, and AI enthusiast. In 2020, he transitioned from a decade-long career in dentistry to pursue his passion for technology, entrepreneurship, and helping others grow.

Connect on LinkedIn