• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Cyber Security Market

Cyber Security Technologies & Markets

  • Cyber Security Events 2022-2023
  • Market Reports
  • Sponsored Post
  • Make a Contribution
  • About
  • Contact

IEEE 30th Computer Security Foundations Symposium (CFS) Paper Wins NSA Best Scientific Cybersecurity Paper Competition

October 25, 2018 By CybersecurityMarket.com

A paper originally accepted at the 30th IEEE Computer Security Foundations Symposium (CSF ’17) won the 6th Annual Best Scientific Cybersecurity Paper Competition, sponsored by the National Security Agency (NSA). The winning paper is “How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games” by researchers Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, and David Brumley, from Carnegie Mellon University (CMU) and University of California, Santa Barbara (UCSB).

“Game theory is a tool that has had tremendous value in many disciplines, but has historically been underutilized in an effective way in cybersecurity,” said Sean Peisert, Chair of the IEEE Technical Committee on Security & Privacy (TCSP), and Staff Scientist, Computational Research Division, at Berkeley National Lab. “This recent work by the CMU/UCSB team represents a powerful method for understanding effective ways of deploying automated cybersecurity techniques, and should have a lasting impact on the cybersecurity field.”

To encourage the development of the scientific foundations of cybersecurity, the NSA established the Annual Best Scientific Cybersecurity Paper Competition. NSA invites nominations of papers that show an outstanding contribution to cybersecurity science. The winning paper was selected from 28 nominations for papers published in 2017.

According to the competition reviewers, this paper was selected because it exemplifies outstanding scientific research, is technically sound, and is well written. The authors developed a cyber-warfare strategy based on strong scientific methods, and this new approach performs better than what was previously known. The reviewers particularly liked that the game-theoretic model was reflective of the physical world with a realistic set of assumptions and attributes, which is refreshing to see in game theory papers. The paper is noteworthy in the validation effort to test the effectiveness of the game theory strategy. They applied their game theory strategy to the third-place team at the DARPA Cyber Grand Challenge. Validation of research with real-world situations is important in science and helps build confidence.

The researchers endeavored to “identify the best strategy for the use of an identified zero-day vulnerability in a ‘cyber-warfare’ scenario where any action may reveal information to adversaries.” They developed a game-theoretic model and the ability to quickly find optimal solutions to it. These strategies aid humans and computers in making decisions when dealing with previously unknown vulnerabilities in computer systems. This model accounts for both attack and defensive actions and imperfect information about the current status. Actions that can be taken include attacking by using this vulnerability, patching one’s own systems, stockpiling for later, or taking no action. The model also develops steps for one to follow over time, such as patching one’s own computers for a period and then later attacking.

The authors of the winning paper will be attending a special recognition ceremony at NSA in October to receive the award and present the paper to an audience of cybersecurity experts. The authors are invited to further discuss their perspectives at the Hot Topics in Science of Security (HoTSoS) meeting in April 2019.

About IEEE Computer Society
The IEEE Computer Society is the world’s home for computer science, engineering, and technology. A global leader in providing access to computer science research, analysis, and information, the IEEE Computer Society offers a comprehensive array of unmatched products, services, and opportunities for individuals at all stages of their professional career. Known as the premier organization that empowers the people who drive technology, its unparalleled resources include membership, international conferences, peer-reviewed publications, a unique digital library, standards, and training programs. Visit www.computer.org for more information.

SOURCE IEEE Computer Society

Related Links
http://www.computer.org

Related

Filed Under: Cybersecurity Market

Footer

Recent Posts

  • A defense-in-depth approach is critical to reduce email risk
  • The Global Cyber Innovation Summit (GCIS), 27-28, 2022, Baltimore, Maryland
  • Hackers have broken into dozens of Russian institutions
  • The 13th Annual Billington CyberSecurity Summit, September 7-9, 2022, Washington Convention Center
  • Black Hat Announces Keynote Speakers for Black Hat Asia 2022 Hybrid Event, May 10–13 2022, Marina Bay Sands, Singapore
  • ISACA Conference North America 2022 hybrid event, 4-6 May 2022, New Orleans, LA
  • The third edition of the Barcelona Cybersecurity Congress (BCC), May 10-12, 2022, Barcelona
  • The Official Cyber Security Summit in Miami on April 7, 2022
  • Black Hat Europe 2021 Announces Keynote Speakers & Releases Full Event Schedule, November 8-11, 2021, ExCeL London
  • Cyber Cartels, Ransomware, AI, & Cryptocurrency Among Cyber Trends Explored at Billington Cybersecurity Summit, October 6-8, 2021

Media Partners

  • Opinion
  • Press Media Release
  • Briefly
  • OPINT
  • VPNW
  • S3H
  • Domain Aftermarkets

Media Partners

  • Technology Conferences
  • Event Sharing Network
  • Defense Conferences
  • Cybersecurity Events
  • Event Calendar
  • Calendarial
  • Domain Market Research

Copyright © 2015 CyberSecurityMarket.com

Technologies, Market Analysis & Market Research Reports

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT