The document was issued by industry or industrial organization.
video
Submitted by privera on Tue, 09/06/2016 - 9:22pm
Shimmix Security Enhanced System Hardware and File System Monitors
file
Advanced Persistent Threat (APT) attackers accomplish their attack objectives by co-opting users' credentials. Traditional cyber defenses leave users vulnerable to APT attacks which employ spearphishing. The success of spearphishing attacks is not a data processing failure, but is the result of defenders failing to apply the principles of Human System Integration to the problem of spearphishing. We discuss an alternative defensive strategy which addresses human performance capabilities and limitations to disrupt spearphishing attacks.
file
ABSTRACT
Cyber-Physical Systems are often subject to strange behavior during state or mode transitions that complicate the modeling of the systems; These transient behaviors can frustrate mode estimation algorithms and can produce counter-intuitive, unwanted, and perhaps disastrous responses in autonomous systems. This talk will provide some examples of these transient cases and an approach to handling them from an autonomous systems viewpoint.