Secure team composition to thwart insider threats and cyber-espionage

Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme

Research output: Contribution to journalArticlepeer-review

7 Scopus citations

Abstract

We develop a formal nondeterministic game model for secure team composition to counter cyber-espionage and to protect organizational secrets against an attacker who tries to sidestep technical securitymechanisms by offering a bribe to a project team member. The game captures the adversarial interaction between the attacker and the project manager who has a secret she wants to protect but must share with a team of individuals selected from within her organization. Our interdisciplinary work is important in the face of the multipronged approaches utilized by well-motivated attackers to circumvent the fortifications of otherwise well-defended targets.

Original languageEnglish (US)
Article number2663499
JournalACM Transactions on Internet Technology
Volume14
Issue number2-3
DOIs
StatePublished - Oct 1 2014

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Secure team composition to thwart insider threats and cyber-espionage'. Together they form a unique fingerprint.

Cite this