
Techniques in the Game of Security: Do They Help or Hinder Players?
Exploring the role of techniques in the game of security, this content delves into whether strategies like patch generation and attacking techniques truly benefit players in defending against exploits or if they can backfire. Through a series of insightful analyses backed by citations from various sources, the narrative questions the effectiveness of different approaches in the cybersecurity landscape.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Security Is a Game Tiffany Bao tiffanybao@cmu.edu Carnegie Mellon University
Me Ph.D. Student for Computer Security
Do Techniques Help Us Win the Game? I Don t Know.
Do Techniques Help Us Win the Game? Patches help defense. Patch generation techniques help defense. Patches may help generate exploits[1]. Patch generation techniques may not help in the game (as a player may not want to patch). [1] D. Brumley, P. Poosankam, D. Song, and J. Zheng. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. In Proceedings of the 2008 IEEE Symposium on Security and Privacy.
for now Do Techniques Help Us Win the Game? ^ The attacker gets benefits from an attack. The attacking techniques help in the game. The victim may attack back to the attacker (due to the Ricochet attack[2]). The attacking techniques may not help in the game (as the players may not even want to attack[3]). [2] T. Bao, Y. Shoshitaishvili, R. Wang and D. Brumley. Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits, Proceedings of the IEEE Symposium on Security and Privacy, 2017. [3] T. Bao, R. Wang, Y. Shoshitaishvili, C. Kruegel, G. Vigna and D. Brumley. How Shall We Play a Game? A Game-Theoretical Model for Cyber-warfare, Proceedings of the IEEE Computer Security Foundation, 2017.
My Confession I Don t Know.
My Plan Technique X Game G Evaluation Framework Technique Xhelps/does not help the players in Game G.
Lightning e enough? nough? 9