March 31, 2023, 1:10 a.m. | Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle, Erwan Abgrall

cs.CR updates on arXiv.org arxiv.org

In this paper we propose a novel way of deploying vulnerable architectures
for defense and research purposes, which aims to generate deception platforms
based on the formal description of a scenario. An attack scenario is described
by an attack graph in which transitions are labeled by ATT&CK techniques or
procedures. The state of the attacker is modeled as a set of secrets he
acquires and a set of nodes he controls. Descriptions of a single scenario on a
technical level …

amp att attack controls deception defense deployment descriptions infrastructure nodes novel platforms procedures refine research scenario secrets single state technical techniques transitions vulnerable vulnerable infrastructure

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer 2

@ Oracle | BENGALURU, KARNATAKA, India

Oracle EBS DevSecOps Developer

@ Accenture Federal Services | Arlington, VA

Information Security GRC Specialist - Risk Program Lead

@ Western Digital | Irvine, CA, United States

Senior Cyber Operations Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

AI Cybersecurity Architect

@ FactSet | India, Hyderabad, DVS, SEZ-1 – Orion B4; FL 7,8,9,11 (Hyderabad - Divyasree 3)