300 prebuilt test suites
Library of nearly 300 fuzz testing suites covering RFCs, file formats, network protocols, ICS protocols, automotive protocols, and APIs. Programs avoid rebuilding coverage the library already provides.
Black Duck • Application security
Defensics is a generative model-based protocol fuzzer that detects zero-day vulnerabilities and reliability issues in service APIs, network protocols, and IoT devices. The platform ships with nearly 300 prebuilt fuzz testing suites covering RFCs, file formats, and protocols, plus an SDK for custom protocol coverage.
Merito sells Defensics and operates the lab setup, suite curation, crash triage, runbook authoring, and SDK rule design that turn protocol fuzzing into a repeatable security program.
What it is
Defensics is Black Duck's protocol fuzzing platform. The architecture is generative model-based fuzzing, which means the platform explores protocol input spaces using formal models and grammars and systematically traverses protocol structures without requiring guidance from the test target. Black-box testing produces zero-day discovery without source code access.
The test-suite library is the practical asset. Defensics ships with nearly 300 prebuilt fuzz testing suites maintained by Black Duck engineers and updated continuously as new RFCs, specifications, and protocols emerge. Coverage spans network protocols (TCP, UDP, IPv6, MQTT, CoAP), industrial-control protocols (Modbus, DNP3, IEC 60870-5), cellular protocols, automotive protocols (CAN, FlexRay), file formats (PDF, image formats, video), and APIs. The breadth lets customers run fuzzing programs without rebuilding coverage that the suite library already provides.
The Defensics SDK extends coverage to proprietary protocols and customer-specific interfaces. The SDK is a framework for creating custom model-based fuzzers that deploy alongside the prebuilt suites. Customers running uncommon, customized, or proprietary protocols use the SDK to extend Defensics into their own surface. Feedback-driven fuzzing prioritizes test paths most likely to expose new behaviors.
Defensics deployments are heavier than scanner rollouts. Programs that scope Defensics like a SAST tool underestimate the lab setup, reproducibility infrastructure, and crash-triage discipline the product requires. Merito treats Defensics as a lab-based program rather than a developer-facing scanner. The engagement model includes lab setup, suite curation against the customer's protocol surface, crash triage workflow, and SDK rule authoring for proprietary protocols.
Ideal use cases
What it is best at
Library of nearly 300 fuzz testing suites covering RFCs, file formats, network protocols, ICS protocols, automotive protocols, and APIs. Programs avoid rebuilding coverage the library already provides.
The fuzzer uses formal protocol models and grammars to systematically explore protocol input spaces. Reproducible test cases survive regression cycles and feed crash triage workflows.
Defensics fuzzes against the running protocol implementation without requiring source code access. Programs can fuzz vendor protocol stacks, third-party libraries, and proprietary firmware where source is unavailable.
The SDK extends fuzzing coverage to customer-specific and proprietary protocols. Programs running uncommon or customized interfaces use the SDK to author custom suites that deploy like the prebuilt ones.
Feedback sources let the engine prioritize test paths most likely to expose new behaviors. Reduces wasted fuzz cycles on input spaces unlikely to surface vulnerabilities.
Core capabilities
The prebuilt coverage that gives Defensics its breadth.
Network protocol suites
TCP, UDP, IPv4, IPv6, TLS, SSH, MQTT, CoAP, HTTP/2, HTTP/3, DNS, DHCP, SIP, RTP, and the broader network protocol landscape.
Industrial-control protocol suites
Modbus, DNP3, IEC 60870-5, IEC 61850, OPC UA, BACnet, and the ICS protocol surface critical to OT security programs.
Automotive protocol suites
CAN, FlexRay, automotive Ethernet, ISO 14229 UDS, ISO 15118 V2G, V2X, and the automotive cybersecurity landscape relevant to UN R155 and ISO 21434.
File format suites
PDF, image formats (JPEG, PNG, TIFF), video formats, archive formats, and document formats commonly parsed by enterprise applications.
API and web protocol suites
REST and SOAP APIs, GraphQL, WebSocket, and the API protocol surface relevant to web service fuzzing.
How Defensics actually generates and prioritizes test cases.
Model-based generative fuzzing
Formal protocol models and grammars drive systematic exploration of protocol input spaces. Test cases are reproducible across regression cycles.
Feedback-driven prioritization
Feedback sources from the test target prioritize test paths likely to expose new behaviors or vulnerabilities. Reduces wasted fuzz cycles.
Black-box testing
Fuzzes against running protocol implementations without source code access. Works against vendor stacks, proprietary firmware, and third-party libraries.
How customers extend coverage to proprietary protocols.
Custom suite authoring
SDK framework for creating custom model-based fuzzers. Customers author suites for proprietary, customized, or uncommon protocols.
Custom suites deploy like prebuilt suites
SDK-authored suites integrate into the same lab workflow and crash-triage discipline as the prebuilt library.
Customer-specific protocol coverage
Programs with internal proprietary protocols (proprietary IoT, defense, industrial) use the SDK to extend Defensics coverage to those interfaces.
How Defensics fits inside an OT or IoT security lab.
Reproducible test cases
Test cases generated from formal models survive regression cycles. Crashes can be reproduced for triage and remediation validation.
Crash triage workflow
Crashes flow into a triage workflow where engineers analyze stack traces, classify vulnerabilities, and validate fixes against the same test cases.
Lab orchestration
Defensics deploys in dedicated lab environments with target devices, traffic generation, and crash collection infrastructure.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Defensics suite licensing
Prebuilt protocol fuzz testing suites licensed by protocol family or bundle.
Best for: Programs running fuzzing against well-known protocol surfaces (IETF RFCs, automotive standards, ICS protocols).
Defensics SDK
Framework for creating custom model-based fuzzers for proprietary, customized, or uncommon protocols.
Best for: Programs with internal proprietary protocols or customized standard-protocol implementations.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Lab setup, target-device integration, suite curation, crash triage workflow design, and runbook authoring.
Explore service02Security program scoping for Defensics adoption alongside other fuzzing platforms and IoT/OT security tooling.
Explore service03Named engineer, priority SLAs, and release-window coverage for Defensics in production.
Explore service04Long-term run support including ongoing suite curation, SDK rule maintenance, crash triage operations, and lab infrastructure evolution.
Explore service05Role-based training for lab engineers, OT/IoT security architects, and crash triage analysts using Defensics output.
Explore service06Merito-placed Defensics engineers and protocol fuzzing specialists embedded on long-running lab programs.
Explore serviceDefensics licensing
Protocol fuzzing is a lab program. Buy Defensics through Merito and get the lab setup, suite curation, crash triage workflow, and SDK rule authoring together.
Merito point of view
Test-suite breadth is genuinely the differentiator. Programs running protocol fuzzing without the Defensics suite library spend significant engineering time recreating coverage that the library already provides. Customers comparing fuzzing platforms should weight the prebuilt suite count and the maintenance commitment heavily because that is where the practical engineering hours go.
Defensics deployments are heavier than scanner rollouts. Programs that scope Defensics like a SAST tool underestimate the lab setup, target-device integration, reproducibility infrastructure, and crash-triage discipline the product requires. Merito's engagement model treats Defensics as a lab-based program with the operating model designed up front.
The SDK is the right answer for proprietary protocols. Programs with internal IoT, defense, or industrial protocols use the SDK to author custom suites that deploy alongside the prebuilt library. Authoring SDK suites takes engineering time but produces durable coverage. Programs that skip the SDK on proprietary protocols leave a meaningful coverage gap.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your protocol surface, target devices, and certification requirements. A Merito Defensics specialist follows up within one business day.
300 prebuilt suites
The library covers RFCs, file formats, and the protocol surface most enterprise programs need. Programs avoid rebuilding what the library already provides.
Lab program
Defensics is a lab program rather than a SAST scanner. Merito designs the lab, curates suites, and stands up the crash triage workflow.
Next step
A Defensics engagement with Merito starts with the lab setup, target-device integration, and suite curation. The first crashes surface in week three when the lab is operating.