Oct. 28, 2022, 1:24 a.m. | Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupé, Subbarao Kambhampati

cs.CR updates on arXiv.org arxiv.org

Identifying the actual adversarial threat against a system vulnerability has
been a long-standing challenge for cybersecurity research. To determine an
optimal strategy for the defender, game-theoretic based decision models have
been widely used to simulate the real-world attacker-defender scenarios while
taking the defender's constraints into consideration. In this work, we focus on
understanding human attacker behaviors in order to optimize the defender's
strategy. To achieve this goal, we model attacker-defender engagements as
Markov Games and search for their Bayesian Stackelberg …

adversarial capture deception environment flag game

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Regional Leader, Cyber Crisis Communications

@ Google | United Kingdom

Regional Intelligence Manager, Compliance, Safety and Risk Management

@ Google | London, UK

Senior Analyst, Endpoint Security

@ Scotiabank | Toronto, ON, CA, M1K5L1

Software Engineer, Security/Privacy, Google Cloud

@ Google | Bengaluru, Karnataka, India

Senior Security Engineer

@ Coinbase | Remote - USA