Secure team composition to thwart insider threats and cyber-espionage

Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme

Research output: Contribution to journalArticle

4 Scopus citations

Abstract

We develop a formal nondeterministic game model for secure team composition to counter cyber-espionage and to protect organizational secrets against an attacker who tries to sidestep technical securitymechanisms by offering a bribe to a project team member. The game captures the adversarial interaction between the attacker and the project manager who has a secret she wants to protect but must share with a team of individuals selected from within her organization. Our interdisciplinary work is important in the face of the multipronged approaches utilized by well-motivated attackers to circumvent the fortifications of otherwise well-defended targets.

Original languageEnglish (US)
Article number2663499
JournalACM Transactions on Internet Technology
Volume14
Issue number2-3
DOIs
StatePublished - Oct 1 2014

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Secure team composition to thwart insider threats and cyber-espionage'. Together they form a unique fingerprint.

  • Cite this

    Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., & Böhme, R. (2014). Secure team composition to thwart insider threats and cyber-espionage. ACM Transactions on Internet Technology, 14(2-3), [2663499]. https://doi.org/10.1145/2663499