Software engineering of deceptive software and systems

NC Rowe, J Rrushi, NC Rowe, J Rrushi - Introduction to Cyberdeception, 2016 - Springer
This chapter considers further details in how to implement the deceptions described in this
book. For readers interested in still more details, Heckman et al.(2015) provides a detailed …

[PDF][PDF] MODELING DECEPTION FOR CYBER SECURITY

C DE FAVERI - 2021 - run.unl.pt
In the era of software-intensive, smart and connected systems, the growing power and
sophistication of cyber attacks poses increasing challenges to software security. The …

[PDF][PDF] Phase II report on intelligent software decoys: intelligent software decoy tools for cyber counterintelligence and security countermeasures

JB Michael, NC Rowe, HS Rothstein, TC Wingfield… - 2004 - researchgate.net
This report documents our accomplishments during Phase II of the Intelligent Software
Decoys Project, including the development of a theory of cyber deception, tools for …

Lamboozling Attackers: A New Generation of Deception: Software engineering teams can exploit attackers' human nature by building deception environments.

K Shortridge, R Petrich - Queue, 2021 - dl.acm.org
The goal of this article is to educate software leaders, engineers, and architects on the
potential of deception for systems resilience and the practical considerations for building …

Design considerations for building cyber deception systems

G Briskin, D Fayette, N Evancich… - … deception: Building the …, 2016 - Springer
Cyber deception can become an essential component of organizing cyber operations in the
modern cyber landscape. Cyber defenders and mission commanders can use cyber …

Multi-paradigm deception modeling for cyber defense

C De Faveri, A Moreira, V Amaral - Journal of Systems and Software, 2018 - Elsevier
Security-critical systems demand multiple well-balanced mechanisms to detect ill-
intentioned actions and protect valuable assets from damage while keeping costs in …

[PDF][PDF] A Deception Planning Framework for Cyber Defense.

JH Jafarian, A Niakanlahiji - HICSS, 2020 - core.ac.uk
The role and significance of deception systems such as honeypots for slowing down attacks
and collecting their signatures are well-known. However, the focus has primarily been on …

Planning and integrating deception into computer security defenses

MH Almeshekah, EH Spafford - Proceedings of the 2014 New Security …, 2014 - dl.acm.org
Deceptive techniques played a prominent role in many human conflicts throughout history.
Digital conflicts are no different as the use of deception has found its way to computing since …

CYBERSECURITY DECEPTION ENGINEERS: THE UNSEEN GUARDIANS OF CYBERSECURITY PROGRAMS AND THE UNSUNG HEROES IN THE BATTLE …

K McLaughlin - EDPACS, 2023 - Taylor & Francis
Deception engineers play a crucial role in cybersecurity by introducing sophisticated threat
detection mechanisms and deceptive measures. Their work involves designing traps …

Navigating the Deception Stack: In-Depth Analysis and Application of Comprehensive Cyber Defense Solutions

A Aly, M Fayez, MM Al-Qutt… - International Journal of …, 2023 - ijicis.journals.ekb.eg
Deception techniques play a crucial role in enhancing cybersecurity by misleading attackers
and safeguarding critical systems. The strategic placement of decoys constructs an …