AD&D 2024 Archive

Accepted Papers

Research Papers

Modeling a Cyber Deception Practitioner’s Approach: Behaviorally Exploiting an American Cybercriminal with Warranting Theory and Whaley’s Unpublished Work on “Unexpected Players”

Application Layer Cyber Deception without Developer Interaction

LLM in the Shell: Generative Honeypots

False Flavor Honeypot: Deceiving Vulnerability Scanning Tools

Redundant Position-based Rogue Access Point Detection

Game Theoretic Framework for Multi Domain Cyber Deception

Program 2024

Friday July 8th, 2024 Times in GMT+2    
  13:30 - 14:15 Keynote: Sebastian Garcia
Topic: Engage your enemy
Technology advanced enough to make honeypots and deception useful again, increasing the role of active defense in protecting our organizations. While still learning how to design, administer, monitor, and decommission our deception, there is an old aspect of defense that should be revised: engaging. Once the attacker is inside our organization, it may be a good idea to consider attacking them. This is a tough decision with the fear of false positives, but that can pay off if done correctly. Don’t let attackers wander inside your network without consequences
  14:15 - 14:45 Modeling a Cyber Deception Practitioner’s Approach
Tim Pappa, Walmart Global Tech
  14:45 - 15:15 Application Layer Cyber Deception without Developer Interaction
Mario Kahlhofer, Dynatrace Research
  15:00 - 15:55 BREAK
  15:35 - 16:05 False Flavor Honeypot: Deceiving Vulnerability Scanning Tools
Tillmann Angeli, German Research Center for Artificial Intelligence GmbH
  16:05 - 16:25 Game Theoretic Framework for Multi Domain Cyber Deception
Ahmed Hemida, DEVCOM Army Research Laboratory
  16:25 - 16:45 LLM in the Shell: Generative Honeypots
Muris Sladić, Czech Technical University in Prague
  16:45 - 17:05 Redundant Position-based Rogue Access Point Detection
Wenjie Liu, KTH Royal Institute of Technology
  17:05 End Closing remarks + Best (short/long) paper award