Nov. 11, 2022, 2:20 a.m. | Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupé, Subbarao Kambhampati

cs.CR updates on arXiv.org arxiv.org

Identifying the actual adversarial threat against a system vulnerability has
been a long-standing challenge for cybersecurity research. To determine an
optimal strategy for the defender, game-theoretic based decision models have
been widely used to simulate the real-world attacker-defender scenarios while
taking the defender's constraints into consideration. In this work, we focus on
understanding human attacker behaviors in order to optimize the defender's
strategy. To achieve this goal, we model attacker-defender engagements as
Markov Games and search for their Bayesian Stackelberg …

adversarial capture deception environment flag game

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer 2

@ Oracle | BENGALURU, KARNATAKA, India

Oracle EBS DevSecOps Developer

@ Accenture Federal Services | Arlington, VA

Information Security GRC Specialist - Risk Program Lead

@ Western Digital | Irvine, CA, United States

Senior Cyber Operations Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

AI Cybersecurity Architect

@ FactSet | India, Hyderabad, DVS, SEZ-1 – Orion B4; FL 7,8,9,11 (Hyderabad - Divyasree 3)