Modeling Applications as Adversarial State Machines Fri Jan 2, 2026 adversary-emulation web-exploitation application-security red-teaming business-logic