Zobrazeno 1 - 10
of 208
pro vyhledávání: '"Raß, Stefan"'
Fooling adversaries with traps such as honeytokens can slow down cyber attacks and create strong indicators of compromise. Unfortunately, cyber deception techniques are often poorly specified. Also, realistically measuring their effectiveness require
Externí odkaz:
http://arxiv.org/abs/2408.10796
Autor:
Kahlhofer, Mario, Rass, Stefan
Cyber deception techniques that are tightly intertwined with applications pose significant technical challenges in production systems. Security measures are usually the responsibility of a system operator, but they are typically limited to accessing
Externí odkaz:
http://arxiv.org/abs/2405.12852
Researchers and engineers are increasingly adopting cloud-native technologies for application development and performance evaluation. While this has improved the reproducibility of benchmarks in the cloud, the complexity of cloud-native environments
Externí odkaz:
http://arxiv.org/abs/2310.12702
Autor:
Mayoral-Vilches, Víctor, Jabbour, Jason, Hsiao, Yu-Shun, Wan, Zishen, Crespo-Álvarez, Martiño, Stewart, Matthew, Reina-Muñoz, Juan Manuel, Nagras, Prateek, Vikhe, Gaurav, Bakhshalipour, Mohammad, Pinzger, Martin, Rass, Stefan, Panigrahi, Smruti, Corradi, Giulio, Roy, Niladri, Gibbons, Phillip B., Neuman, Sabrina M., Plancher, Brian, Reddi, Vijay Janapa
We introduce RobotPerf, a vendor-agnostic benchmarking suite designed to evaluate robotics computing performance across a diverse range of hardware platforms using ROS 2 as its common baseline. The suite encompasses ROS 2 packages covering the full r
Externí odkaz:
http://arxiv.org/abs/2309.09212
Autor:
Rass, Stefan, Pinzger, Martin
We describe a mechanism to create fair and explainable incentives for software developers to reward contributions to security of a product. We use cooperative game theory to model the actions of the developer team inside a risk management workflow, c
Externí odkaz:
http://arxiv.org/abs/2309.05338
Autor:
Deng, Gelei, Liu, Yi, Mayoral-Vilches, Víctor, Liu, Peng, Li, Yuekang, Xu, Yuan, Zhang, Tianwei, Liu, Yang, Pinzger, Martin, Rass, Stefan
Penetration testing, a crucial industrial practice for ensuring system security, has traditionally resisted automation due to the extensive expertise required by human professionals. Large Language Models (LLMs) have shown significant advancements in
Externí odkaz:
http://arxiv.org/abs/2308.06782
This paper addresses the prevalent lack of tools to facilitate and empower Game Theory and Artificial Intelligence (AI) research in cybersecurity. The primary contribution is the introduction of ExploitFlow (EF), an AI and Game Theory-driven modular
Externí odkaz:
http://arxiv.org/abs/2308.02152