SlideShare a Scribd company logo
BIG GAME THEORY HUNTING
Kelly Shortridge (@swagitda_)
Black Hat 2017
THE PECULIARITIES OF HUMAN BEHAVIOR IN
THE INFOSEC GAME
I’m Kelly
This is game theory
It’s time for hunting some
game theory
4
5
Do you believe bug-free software is a
reasonable assumption?
6
Do you believe wetware is more
complex than software?
7
Traditional Game Theory relies on the
assumption of bug-free wetware
8
Behavioral Game Theory assumes
there’s no such thing as bug-free
9
“Think how hard physics would be
if particles could think”
—Murray Gell-Mann
10
“Amateurs study cryptography,
professionals study economics”
—Dan Geer quoting Allan Schiffman
11
This is what you’ll learn:
12
1. Why traditional game theory isn’t even a
theory and is unfit for strategy-making
2. A new framework for modeling the infosec
game based on behavioral insights
3. New defensive strategies that exploit your
adversaries’ “thinking” and “learning”
13
Let’s go hunting to find out
why
I. What is Game Theory?
tl;dr – game theory is a mathematical language
used to describe scenarios of conflict and
cooperation
15
Game theory is more about language than
theory
Use it as a engendering tool, not as something
to dictate optimal strategies
16
GT applies whenever actions of players are
interdependent
Strategic scenarios include many types of
games, with different “solutions” for each
17
18
Zero Sum Games
Lou Levit
19
Non-Zero Sum Games
20
Negative Sum Games
21
Positive Sum Games
22
Complete vs. Incomplete Information
23
Perfect vs. Imperfect Information
Paul Green
24
Information Symmetry vs. Asymmetry
Dakota Corbin
Defender Attacker Defender Games
Sequential games in which sets of players are
attackers and defenders
Assumes people are risk-neutral & attackers
want to be maximally harmful
26
First move = defenders choosing a defensive
investment plan
Second move = attackers observe the defensive
preparations & choose an attack plan
27
28
Nash Equilibrium is often used to
“solve” games. This is bad.
Nash Equilibrium = optimal outcome of a non-
cooperative game
Players are making the best decisions for
themselves while taking their opponent’s
decisions into account
29
30
Prisoner’s Dilemma
Player1
Player 2
Confess
Refuse
Confess Refuse
-2, -2 0, -4
-4, 0 -1, -1
Nash Equilibrium is based on a priori reasoning
Assumes rational, all-knowing players
Assumes others’ decisions don’t affect you
31
People have applied Nash
Equilibrium to infosec over the
years…
32
Defender should play extremely fast so the
attacker drops out of the game
Better to invest in security than not invest,
regardless of attacker strategy (wow!)
Just apply tons of mathematical equations!
33
II. New defensive framework
Use GT for its expressive power in describing a
framework for the infosec game
Look at data outside GT, e.g. from experiments
in domains similar to infosec, to select correct
assumptions
35
What game is infosec?
Ruben Bagues
DAD game (continuous defense & attack)
Non-zero-sum
Incomplete, imperfect, asymmetrical information
Sequential / dynamic
37
38
This is a (uniquely?) tricky game
39
Have you heard infosec described as
a “cat and mouse” game before?
40
Traditional Game Theory doesn’t
allow for those…
…or most of the characteristics of the
“infosec game”
Assumes people are rational (they aren’t)
Assumes static vs. dynamic environments
Can’t ever be “one step ahead” of your adversary
Deviations from Nash Equilibrium are common
41
42
“I feel, personally, that the study of
experimental games is the proper route of
travel for finding ‘the ultimate truth’ in
relation to games as played by human
players”
—John Nash
Behavior-based framework
Dayne Topkin
Experimental – how do people actually behave?
People predict their opponent’s moves by either
“thinking” or “learning”
44
45
Thinking = modeling how opponents
are likely to respond
Our brains work like volatile memory
46
Working memory is a hard constraint for human
thinking
Enumerating steps past the next round is hard
Humans kinda suck at recursion
47
48
Learning = predicting how players will
act based on prior games / rounds
Humans learn through “error-reinforcement
learning” (trial & error)
People have “learning rates,” how much
experiences factor into decision making
Dopamine neurons encode errors
49
Veksler & Buchler study
200 consecutive “security games” across 4
strategies
Different learning rates for attackers
Tested # of prevented attacks for each strategy
50
Fixed strategy = prevent 10% - 25% of attacks
Game Theory strategy = prevent 50% of attacks
Random strategy = prevent 49.6% of attacks
Cognitive Modeling strategy = prevent between
61% - 77%
51
52
Don’t be replaced by a random
SecurityStrategyTM algorithm
III. Implementation
53
1. SWOT Analysis
2. Thinking Exploitation
3. Learning Exploitation
4. Minimax
5. Looking Ahead
54
SWOT Analysis
Scott Webb
56
101: Traditional SWOT
Strengths, Weaknesses,
Opportunities, Threats
Model SWOT for yourself in relation to your
adversary
Model SWOT for your adversary in relation to
you
57
“The primary insight of GT is the
importance of focusing on others – of
putting yourself in the shoes of other
players and trying to play out all the
reactions…as far ahead as possible”
– Adam Brandenburger
58
59
Strengths Weaknesses
Opportunities Threats
▪ Inadequate budget
▪ Lack of personnel
▪ Limited employee training
▪ Understanding of target
environment
▪ Motivation to not be
breached
▪ Leverage new tech to allow
for tear up/down
▪ Increased board attention
to get budget
▪ Attackers can use new tech
for scalability
▪ Hard to keep up with pace
of new attack surface
60
201: Perceptual SWOT
For you and your adversary, consider:
How can the strengths be weaknesses?
How can the weaknesses be strengths?
61
62
Threat
Opportunity
Strength
Strength
Weakness
Weakness
Opportunity
Threat
Strength
Strength
Weakness
Weakness
Reality
Perception
Reality
Perception
Self vs. Other
“Core rigidities” = deeply embedded knowledge
sets that create problems
Compliance, fixed security guidelines
Top management can be the wrong people for
an evolving environment
63
Attacker strength = having time to craft an attack
Leverage that “strength” with strategies leading
down rabbit holes and wasting their time
64
Attacker strength = access to known vulns
Confuse them with fake architecture so they
can’t be certain what systems you’re running
65
Thinking Exploitation
Thinking strategy: belief prompting
Increase players thinking by one step
67
“Prompt” the player to consider who their
opponents are & how their opponents will react
Model assumptions around capital, time, tools,
risk aversion
68
Your goal is to ask, “if I do X, how will
that change my opponent’s strategy?”
69
A generic belief prompting guide:
70
How would attackers pre-emptively bypass the
defensive move?
What will the opponent do next in response?
Costs of the opponent’s offensive move?
Probability the opponent will conduct the move?
71
72
Example: A skiddie lands on one of
our servers, what do they do next?
Perform local recon, escalate to whatever privs
they can get
Counter: priv separation, don’t hardcode creds
Leads to: attacker must exploit server, risk =
server crashes
73
Decision Tree Modelling
Jessica Furtney
Model decision trees both for offense & defense
Theorize probabilities of each branch’s outcome
Creates tangible metrics to deter self-
justification
75
“Attackers will take the least cost path
through an attack graph from their start
node to their goal node”
– Dino Dai Zovi, “Attacker Math”
76
77
Reality
Skiddies / Random Criminal Group
Nation State
Priv Separation
Known exploit
GRSecseccomp
Elite
0day
Use DB
on box
Role sep
Win
Tokenization,
segmentation
Absorb into
botnet
Anomaly
detection
1day
Win
0%
60%
50%
50%
98%
2%
5%
10%
50%
40%
25%
30%
100%
0%
60%
40%
70% 0%
0%
65%
10%
25%
1. Which of your assets do attackers want?
2. What’s the easiest way attackers get to those assets?
3. What countermeasures are on that path?
4. What new path will the attacker take given #3?
5. Repeat 1 – 4 until it’s “0day all the way down”
6. Assign rough probabilities
78
79
Whiteboards + camera snaps (or “DO NOT ERASE!!!!”)
Draw.io, Gliffy (plugs into Confluence)
Google Docs (> insert drawing)
PowerPoint (what I used)
Visio (last resort)
80
Decision trees help create a feedback
loop to refine strategy
Decision trees help for auditing after an incident
& easy updating
Serves as a historical record to refine decision-
making process
Mitigates “doubling down” effect by showing
where strategy failed
81
Defender’s advantage = knowing the home turf
Visualize the hardest path for attackers – how
can you force them onto to that path?
Commonalities on trees = which strategies
mitigate the most risk across various attacks
82
Make decision trees the new “nice report”
#WOCinTech
A new request for your pen-testers / red-team
The ask: outline which paths they did or didn’t
take, and why (a decision tree w/ explanations)
Helps you see the attacker perspective of your
defenses & where to improve
84
Learning Exploitation
Information asymmetry exploitation – disrupt
attacker learning process
Learning rate exploitation – introduce
unreliability and pre-empt moves
86
87
Exploit the fact that
you understand the local environment
better than attackers
Falsifying Data
Braydon Anderson
Defenders have info adversaries need to
intercept
Dynamic envs = frequently in learning phase
Hide or falsify data on the legitimate system side
89
Macron Case Study
Soroush Karimi
Allegedly used phishing tarpitting
Signed onto phishing pages & planted bogus
creds and info
Obvious fakes in dumped documents
91
92
#wastehistime2016…but for hackers
93
Goal is to remove the attacker’s scientific
method so they can’t test hypotheses
(Pretend like hashtags are a thing and tweet
#wastehackertime2017 with your own ideas)
94
Create custom email rejection messages
Create honeydoc on the “Avallach Policy”
Have response to suspicious emails be, “This
violates the Avallach policy”
Track when the doc is accessed
95
General strategy: create honeytokens that look
to describe legitimate policies or technologies
that would be useful in attacker recon
Non-Determinism
Candice Seplow
97
Different behaviors at different times
Can’t expect same result every time
98
ASLR is a non-deterministic feature, but highly
deterministic in that it always works the same
I want to amplify and extend it to higher levels
99
Raise costs at the very first step of the attack:
recon
Make the attacker uncertain of your defensive
profile and environment
100#WOCinTech
Attackers now design malware to be VM-aware
101
Good: Make everything look like a malware
analyst’s sandbox
Better: Make everything look like a different
malware analyst’s sandbox each time
Put wolfskins on the sheep
103
Mix & match hollow but sketchy-
looking artifacts on normal, physical
systems
104
RocProtect-v1 –
https://github.com/fr0gger/RocProtect-V1
Emulates virtual artifacts onto physical machine
(see Unprotect Project as well)
105
VMwareServices.exe
VBoxService.exe
Vmwaretray.exe
VMSrvc.exe
vboxtray.exe
ollydbg.exe
wireshark.exe
fiddler.exe
.pipecuckoo
cuckoomon.dll
dbghelp.dll
Mac addresses:
"00:0C:29", "00:1C:14",
"00:50:56", "00:05:69"
106
system32driversVBoxGuest.sys
system32driversVBoxMouse.sys
HKLMSOFTWAREOracleVirtualBox Guest
Additions
C:cuckoo, C:IDA
Program FilesVmware
107
Make the IsDebuggerPresent function call
always return non-zero
Create fake versions of driver objects like
.NTICE and .SyserDbgMsg
Set KdDebuggerEnabled to 0x03
108
Load DLLs from AV engines using a Windows
loader with a forwarder DLL
ex64.sys (Symantec)
McAVSCV.DLL (McAfee)
SAUConfigDLL.dll (Sophos)
cbk7.sys (Carbon Black)
cymemdef.dll (Cylance)
CSAgent.sys (Crowdstrike)
109
Deploy lightest weight hypervisor possible for
added “wolfskin”
https://github.com/asamy/ksm
https://github.com/ionescu007/SimpleVisor
https://github.com/Bareflank/hypervisor
110
Minimax
Mike Wilson
111
Minimax / maximin = minimize the possible loss
for a worst case maximum loss scenario
112
Want to find the minimum of the sum of the
expected cost of protection and expected cost
of non-protection
113
Don’t have a monoculture – diversity is strongly
beneficial for protection
Stochastic decisions may be better than
deterministic
From The Imitation Game: should only act on
Enigma info some of the time, not all
Looking Ahead
115
Fluctuating infrastructure using emerging tech in
“Infrastructure 3.0”
Netflix’s Chaos Monkey
https://github.com/Netflix/SimianArmy/wiki/Cha
os-Monkey
116
Modelling attacker cognition via model tracing
Prerequisite: how to begin observing attacker
cognition
117
Preferences change based on experience
Models incorporate the “post-decision-state”
Higher the attacker’s learning rate, easier to
predict their decisions
118
ΔUA = α (R – UA), where:
▪ UA = expected utility of an offensive action
▪ α = learning rate
▪ R = feedback (success / failure)
119
If α = 0.2, R = 1 for win & -1 for loss, then:
▪ ΔUA = 0.2(1- 0) = 0.2
Attacker is 20% more likely to do this again
From here, you can adjust the learning rate
based on data you see
120
Track utility values for each attacker action
For detected / blocked actions, attacker action &
outcome are known variables (so utility is
calculable)
Highest “U” = action attacker will pursue
IV. Conclusion
121
122
It is no longer time for some
Game Theory
123
In fact, we’ve learned that GT is a
language, not even a theory
124
Start with a SWOT analysis to gain
perspective
125
Use thinking exploitation to improve
threat modelling
126
Use learning exploitation to
beleaguer your adversaries
127
Let’s work together to build strategies
based on this behavioral framework
128
Next step – how to begin model-
tracing attackers
After that – predict attacker behavior
129
Try these at home – make your blue
team empirical
Worst case, random strategies beat
fixed ones & are just as good as GT
130
“Good enough is good
enough. Good enough always
beats perfect.”
—Dan Geer
Suggested reading
▪ David Laibson’s Behavioral Game Theory lectures @ Harvard
▪ “Game Theory: A Language of Competition and Cooperation,” Adam Brandenburger
▪ “Advances in Understanding Strategic Behavior,” Camerer, Ho, Chong
▪ “Know Your Enemy: Applying Cognitive Modeling in the Security Domain,” Veksler, Buchler
▪ “Know Your Adversary: Insights for a Better Adversarial Behavioral Model,” Abbasi, et al.
▪ “Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous
Efforts,” Payappalli, Zhuang, Jose
▪ “Improving Learning and Adaptation in Security Games by Exploiting Information Asymmetry,”
He, Dai, Ning
▪ “Behavioral theories and the neurophysiology of reward,” Schultz
▪ “Evolutionary Security,” and “Measuring Security,” Dan Geer
131
132
@swagitda_
/in/kellyshortridge
kelly@greywire.net

More Related Content

Similar to Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game

Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015
Malachi Jones
 
Project:Filter Design and Experimentation
Project:Filter Design and ExperimentationProject:Filter Design and Experimentation
Project:Filter Design and Experimentation
Abertay University
 
Game Balance 3: Interesting Strategies
Game Balance 3: Interesting StrategiesGame Balance 3: Interesting Strategies
Game Balance 3: Interesting Strategies
Marc Miquel
 
Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02
Sotiris Silaidopoulos
 
Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02
Sotiris Silaidopoulos
 
A decision action model for soccer
A decision action model for soccerA decision action model for soccer
A decision action model for soccer
Larry Paul
 
gt_2007
gt_2007gt_2007
gt_2007
webuploader
 
From Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceFrom Human Intelligence to Machine Intelligence
From Human Intelligence to Machine Intelligence
NUS-ISS
 
Autenrieth&wechselberger ract15
Autenrieth&wechselberger ract15Autenrieth&wechselberger ract15
Autenrieth&wechselberger ract15
Kelvin Autenrieth
 
10-15 research project preview
10-15 research project preview10-15 research project preview
10-15 research project preview
Alan Nochenson
 
Planning and Integrating Deception into Computer Security Defenses
Planning and Integrating Deception into Computer Security DefensesPlanning and Integrating Deception into Computer Security Defenses
Planning and Integrating Deception into Computer Security Defenses
Mohammed Almeshekah
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
Mohammed Almeshekah
 
Security for Thinkers
Security for ThinkersSecurity for Thinkers
Security for Thinkers
grabyourfreedom
 
huntpedia.pdf
huntpedia.pdfhuntpedia.pdf
huntpedia.pdf
CecilSu
 
Game theory for a better world
Game theory for a better worldGame theory for a better world
Game theory for a better world
Gendry Morales
 
Game theory in network security
Game theory in network securityGame theory in network security
Game theory in network security
RahmaSallam
 
Priiva consulting corporation_presentation midi_reg r14 sept 2010
Priiva consulting corporation_presentation midi_reg r14 sept 2010Priiva consulting corporation_presentation midi_reg r14 sept 2010
Priiva consulting corporation_presentation midi_reg r14 sept 2010
Bill Forquer
 
Final_Presentation
Final_PresentationFinal_Presentation
Final_Presentation
Joe Totherow
 
Gamification - ASTD RTA
Gamification - ASTD RTAGamification - ASTD RTA
Gamification - ASTD RTA
trickyraymer
 
Leap from Doing Agile to Being Agile_AAC2019
Leap from Doing Agile to Being Agile_AAC2019Leap from Doing Agile to Being Agile_AAC2019
Leap from Doing Agile to Being Agile_AAC2019
Agile Austria Conference
 

Similar to Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game (20)

Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015
 
Project:Filter Design and Experimentation
Project:Filter Design and ExperimentationProject:Filter Design and Experimentation
Project:Filter Design and Experimentation
 
Game Balance 3: Interesting Strategies
Game Balance 3: Interesting StrategiesGame Balance 3: Interesting Strategies
Game Balance 3: Interesting Strategies
 
Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02
 
Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02
 
A decision action model for soccer
A decision action model for soccerA decision action model for soccer
A decision action model for soccer
 
gt_2007
gt_2007gt_2007
gt_2007
 
From Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceFrom Human Intelligence to Machine Intelligence
From Human Intelligence to Machine Intelligence
 
Autenrieth&wechselberger ract15
Autenrieth&wechselberger ract15Autenrieth&wechselberger ract15
Autenrieth&wechselberger ract15
 
10-15 research project preview
10-15 research project preview10-15 research project preview
10-15 research project preview
 
Planning and Integrating Deception into Computer Security Defenses
Planning and Integrating Deception into Computer Security DefensesPlanning and Integrating Deception into Computer Security Defenses
Planning and Integrating Deception into Computer Security Defenses
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
 
Security for Thinkers
Security for ThinkersSecurity for Thinkers
Security for Thinkers
 
huntpedia.pdf
huntpedia.pdfhuntpedia.pdf
huntpedia.pdf
 
Game theory for a better world
Game theory for a better worldGame theory for a better world
Game theory for a better world
 
Game theory in network security
Game theory in network securityGame theory in network security
Game theory in network security
 
Priiva consulting corporation_presentation midi_reg r14 sept 2010
Priiva consulting corporation_presentation midi_reg r14 sept 2010Priiva consulting corporation_presentation midi_reg r14 sept 2010
Priiva consulting corporation_presentation midi_reg r14 sept 2010
 
Final_Presentation
Final_PresentationFinal_Presentation
Final_Presentation
 
Gamification - ASTD RTA
Gamification - ASTD RTAGamification - ASTD RTA
Gamification - ASTD RTA
 
Leap from Doing Agile to Being Agile_AAC2019
Leap from Doing Agile to Being Agile_AAC2019Leap from Doing Agile to Being Agile_AAC2019
Leap from Doing Agile to Being Agile_AAC2019
 

More from Kelly Shortridge

The Red Pill of Resilience
The Red Pill of ResilienceThe Red Pill of Resilience
The Red Pill of Resilience
Kelly Shortridge
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-Making
Kelly Shortridge
 
How to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec Autodidact
Kelly Shortridge
 
The Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosec
Kelly Shortridge
 
Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off?
Kelly Shortridge
 
DIY Education in Cyber Security
DIY Education in Cyber SecurityDIY Education in Cyber Security
DIY Education in Cyber Security
Kelly Shortridge
 
Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped Out
Kelly Shortridge
 

More from Kelly Shortridge (7)

The Red Pill of Resilience
The Red Pill of ResilienceThe Red Pill of Resilience
The Red Pill of Resilience
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-Making
 
How to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec Autodidact
 
The Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosec
 
Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off?
 
DIY Education in Cyber Security
DIY Education in Cyber SecurityDIY Education in Cyber Security
DIY Education in Cyber Security
 
Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped Out
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game