2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW) 2021
DOI: 10.1109/asew52652.2021.00038
|View full text |Cite
|
Sign up to set email alerts
|

Decision-Making Biases and Cyber Attackers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 42 publications
0
12
0
Order By: Relevance
“…While decision-making is a promising way of disrupting attackers, interactions with machines are by no means the only place CB may be present. The choices of confirmation bias and framing effects in general limited our examination of biases in decision-making, despite the existence of other cyber-relevant biases at large (Johnson et al, 2020; Johnson et al, 2022).…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…While decision-making is a promising way of disrupting attackers, interactions with machines are by no means the only place CB may be present. The choices of confirmation bias and framing effects in general limited our examination of biases in decision-making, despite the existence of other cyber-relevant biases at large (Johnson et al, 2020; Johnson et al, 2022).…”
Section: Discussionmentioning
confidence: 99%
“…There is some limited conceptual evidence that several biases affect attackers (Johnson et al, 2021). For example, notionally, attackers are often loss averse when it comes to using zero-day attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some researchers have pointed out that traditional CTF events were not designed for measuring human performance and that controlled red team experiments can be advantageous [6]. For example, Johnson et al used lab-based experiments to study deception and decision making [9]. Our work seeks to overcome some of these limitations by creating new data collection and analysis of human behavior that would work equally well in controlled experiments.…”
Section: Related Workmentioning
confidence: 99%
“…This is potentially far more scalable than any technological implementation, as making use of common human limitations assumes only that the attacker is human. Biasing behavior is a useful tool toward detecting and mitigating attackers (Johnson et al, 2021).…”
Section: Introductionmentioning
confidence: 99%