Tim Pappa (Walmart)

Cyber threat actors generally create branding content to promote their reputation. While threat actor branding content could include carders masquerading as hacktivists, for example, the reputational branding of cyber threat actors is generally considered to be a singular, symbolic display of their threat and capabilities. This presentation suggests that Security Operations Centers (SOC) and cyber threat intelligence communities could proactively collect unique forensic and observational behavioral threat information on threat actors by manipulating their reputational content, anticipating threat actors will respond or react behaviorally when their reputations are questioned or ridiculed publicly. This presentation is exploratory, recognizing that most accounts of manipulating cyber threat actor reputational content are anecdotal. This presentation proposes an integrated conceptual interpretation of the foundational theoretical frameworks that explain why and how people respond behaviorally to content made for them, applied in a context of influencing threat actors with generative artificial intelligence content.

View More Papers

Resilient Routing for Low Earth Orbit Mega-Constellation Networks

Alexander Kedrowitsch (Virginia Tech), Jonathan Black (Virginia Tech) Daphne Yao (Virginia Tech)

Read More

Securing Automotive Software Supply Chains (Long)

Marina Moore, Aditya Sirish A Yelgundhalli (New York University), Justin Cappos (NYU)

Read More

Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware...

Zicong Gao (State Key Laboratory of Mathematical Engineering and Advanced Computing), Chao Zhang (Tsinghua University), Hangtian Liu (State Key Laboratory of Mathematical Engineering and Advanced Computing), Wenhou Sun (Tsinghua University), Zhizhuo Tang (State Key Laboratory of Mathematical Engineering and Advanced Computing), Liehui Jiang (State Key Laboratory of Mathematical Engineering and Advanced Computing), Jianjun Chen (Tsinghua…

Read More

LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors

Chengkun Wei (Zhejiang University), Wenlong Meng (Zhejiang University), Zhikun Zhang (CISPA Helmholtz Center for Information Security and Stanford University), Min Chen (CISPA Helmholtz Center for Information Security), Minghu Zhao (Zhejiang University), Wenjing Fang (Ant Group), Lei Wang (Ant Group), Zihui Zhang (Zhejiang University), Wenzhi Chen (Zhejiang University)

Read More