Joe Clark / en Mason professors are researching hacker psychology to defend against cyberattacks /news/2024-05/mason-professors-are-researching-hacker-psychology-defend-against-cyberattacks <span>Mason professors are researching hacker psychology to defend against cyberattacks</span> <span><span lang="" about="/user/231" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Colleen Rich</span></span> <span>Thu, 05/02/2024 - 09:39</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">A team of ĐÔĘӽ紫ý researchers is probing the psychology behind cyberattacks as part of a U.S. intelligence community program aimed at turning the tables on hackers.</span></p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-05/cybersecurity_gettyimages-funtap1484313578_.jpg?itok=wb4ntm7k" width="350" height="205" alt="cybersecurity graphics" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Illustration by Getty Images</figcaption></figure><p><span><span><span>As the prevalence and severity of cyberattacks continue to grow, the Intelligence Advanced Research Project Activity (IARPA) has turned its focus on how best to exploit the weakest link in cyberattacks: the human factor. </span></span></span></p> <p><span><span><span>Under a new IARPA program, researchers hope to better understand cyber attackers’ cognitive vulnerabilities and decision-making biases and use those vulnerabilities to derail future attacks. </span></span></span></p> <p><span><span><span>Researchers <a href="https://volgenau.gmu.edu/profiles/dbarbara">Daniel Barbará</a>, <a href="https://computing.gmu.edu/profiles/ateniese">Giuseppe Ateniese</a>, and <a href="https://psychology.gmu.edu/people/gmatthe">Gerald Matthews</a> were recently selected as part of a broader team of computer science, cybersecurity, and psychology experts to forge new research pathways and deliver cutting-edge  technology as part of IARPA’s Reimagining Security with Cyberpsychology-Informed Network Defense, or ReSCIND, program.</span></span></span></p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-05/110406052e.jpg?itok=s7eJDMa9" width="282" height="350" alt="Daniele Barbara" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Daniel Barbara. Photo by Office of University Branding</figcaption></figure><p><span><span><span>The team of researchers will build defensive tools that first cue in on hackers’ human limitations and use those weaknesses to delay or derail the attack while it is underway.  </span></span></span></p> <p><span><span><span>“You want to make them waste their time,” said Barbará, a computer science professor at ĐÔĘӽ紫ý’s <a href="https://cec.gmu.edu/">College of Engineering and Computing</a>. “The more they waste their time, the least damage they’re going to do.”</span></span></span></p> <p><span><span><span>This can be accomplished by luring hackers with decoys such as false networks or documents to distract them. </span></span></span></p> <p><span><span><span>But the trick is two-fold. The decoys must first and foremost appear to be real. They also need to entice the hackers away from their original aim. The latter is where understanding the psychological factors that influence hackers is essential. </span></span></span></p> <p><span><span><span>As part of the first phase of the ReSCIND program, researchers will aim to fill gaps that exist in the current understanding of human cognition and decision making that influence cyber attackers’ behavior. </span></span></span></p> <p><span class="intro-text">“It’s a challenging topic to address because hackers, of course, tend to be somewhat secretive,” Matthews, a professor of psychology at ĐÔĘӽ紫ý, said. “There aren’t many opportunities to study hacker psychology.”</span></p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2024-05/giuseppe-ateniese-1x1-profile.jpg?itok=QNcLhVg5" width="350" height="474" alt="Giuseppe" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Giuseppe Ateniese. Photo provided</figcaption></figure><p><span><span><span>Matthews said the current understanding of hackers’ behavior that provides the baseline for their research comes from several areas of study in psychology. Key among those areas is human performance and in particular how emotional states might influence performance. </span></span></span></p> <p><span><span><span>“Hackers themselves are under pressure and potentially anxious about getting caught,” Matthews said. “They’re anxious about looking foolish to the people that they are working with.”</span></span></span></p> <p><span><span><span>Cultural factors that motivate hackers are also important to consider and may vary greatly among hackers. Thrill-seeking college-age hackers, for example, would have different cultural norms and motives than highly trained professionals acting on behalf of a nation-state adversary, Matthews said.</span></span></span></p> <p><span><span><span>Researchers hope to further understand the full scope of psychological factors that influence hackers, including how to measure, predict, and induce their cognitive vulnerabilities. </span></span></span></p> <p><span><span><span>“There’s a certain amount of psychology that allows you to link the emotional reactions that hackers might have to cognitive biases and other vulnerabilities in performance,” Matthews said. “So, in this first part of the research, we’re trying to sketch out what some of those vulnerabilities might be.”</span></span></span></p> <p><span><span><span>As part of the second phase, researchers will further define when cyberpsychology-informed defenses can best be used and how to determine the success of those defenses. The final phase will focus on modeling, adapting, and automating those defenses.</span></span></span></p> <p><span><span><span>Ateniese, a computer science professor and eminent scholar in cybersecurity, said the ReSCIND program reflects the growing importance of cyberpsychology research in shaping emerging technology. </span></span></span></p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2024-05/matthews_pic-1.jpg?itok=G5k0FHSz" width="352" height="396" alt="Matthews" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Gerald Matthews. Photo provided</figcaption></figure><p><span><span><span>“I see a myriad of excellent applications, not just this project,” Ateniese said. “As you can imagine, people today are building AI systems that either mimic or seek to improve upon human behavior. So, the psychology perspective is very intriguing.”</span></span></span></p> <p><span><span><span>The ReSCIND program will run for nearly four years and is being carried out through research contracts awarded across five teams.</span></span></span></p> <p><span><span><span>Barbará, Ateniese, and Matthews’ research will contribute to a ReSCIND contract awarded to SRI International, an independent nonprofit research institute headquartered in California.</span></span></span></p> <p><span><span><span>The ĐÔĘӽ紫ý team will work alongside experts from the Florida Institute for Human and Machine Cognition, Margin Research, Research and Assessment Design: Science Solution, Two Six Technologies, University of Florida, and Virtual Reality Medical Center.</span></span></span></p> <p><span><span><span>In many ways, the project is a natural progression for the three professors who have worked together on several previous projects requiring a multidisciplinary approach. </span></span></span></p> <p><span><span><span>They were first introduced in 2021 by Amarda Shehu, a computer science professor and co-director at the time of the ĐÔĘӽ紫ý’s transdisciplinary <a href="https://cahmp.gmu.edu/">Center for Advancing Human-Machine Partnerships</a> (CAHMP). </span></span></span></p> <p><span><span><span>A call for proposals from Virginia’s Commonwealth Cyber Initiative for a project that sought to bridge cybersecurity and human factors research to help users build secure passwords immediately brought to mind Barbará, Ateniese, and Matthews’ expertise. </span></span></span></p> <p><span><span><span>“I always had the agenda of putting teams together and finding some funding opportunities so that then they could obtain preliminary results through which to demonstrate credibility for larger projects,” Shehu said. </span></span></span></p> <p><span><span><span>The match has led to a series of successful projects by the team, including the Commonwealth Cyber Initiative password project and a project focused on distinguishing authentic videos from deepfakes. </span></span></span></p> <p><span><span><span>“The IARPA project is, in some sense, an example of the culmination of an activity, how you put a team together,” Shehu said. “They find some funding so that they can start that relationship and then that kind of blossoms into a larger project. It's really a perfect example of what we want to see in […] in general at Mason in terms of transdisciplinary research and the fruit of that research.”</span></span></span></p> <p><span><span><span>Shehu, now associate vice president for research for Mason’s <a href="https://idia.gmu.edu/">Institute for Digital Innovation</a>, said bringing teams together with broad collective expertise is critical to solving the most complex impediments to technological progress. </span></span></span></p> <p><span><span><span>“The most challenging problems nowadays don't reside specifically within one discipline,” she said. “They bridge disciplines.”</span></span></span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="aa9c41f0-0fb7-46eb-a73e-ea58b759edbb" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="22d313bc-f4a2-4a65-993b-0c1776cceef2" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ashehu" hreflang="und">Amarda Shehu</a></div> <div class="field__item"><a href="/profiles/dbarbara" hreflang="und">Daniel Barbará</a></div> <div class="field__item"><a href="/profiles/ateniese" hreflang="en">Giuseppe Ateniese</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:feature_image" data-inline-block-uuid="16a5b1cc-1c82-4cf7-a26d-a1bff5841a00" class="block block-feature-image block-layout-builder block-inline-blockfeature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"> <img src="/sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2023-07/1.png?itok=i7iiKAdz" srcset="/sites/g/files/yyqcgq291/files/styles/feature_image_small/public/2023-07/1.png?itok=gPwpqoNE 768w, /sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2023-07/1.png?itok=i7iiKAdz 1024w, /sites/g/files/yyqcgq291/files/styles/feature_image_large/public/2023-07/1.png?itok=jNMZzKgm 1280w, " sizes="(min-width: 1024px) 80vw,100vw" alt="" "" /></div> </div> </div><div data-block-plugin-id="inline_block:text" data-inline-block-uuid="eefb6733-a6f2-492c-ba87-9bfa89ed1cc4" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="a852cad5-39c5-4004-b5c9-a2b2c25e0aea" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-5cdee5e4663888418b8c275ec95f955765c98b55d34a71a301dc6bfb44d9f942"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"><li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-08/information-technology-students-stepped-secure-virginias-elections" hreflang="en">Information technology students stepped up to secure Virginia’s elections </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 28, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-08/cybersecurity-honors-college-student-ready-hit-ground-running" hreflang="en">Cybersecurity Honors College student ready to hit the ground running</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-05/george-mason-faculty-are-tackling-cybersecuritys-talent-pipeline-problem" hreflang="en">ĐÔĘӽ紫ý faculty are tackling cybersecurity’s talent pipeline problem</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">May 10, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-05/mason-professors-are-researching-hacker-psychology-defend-against-cyberattacks" hreflang="en">Mason professors are researching hacker psychology to defend against cyberattacks</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">May 2, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-02/commonwealth-cyber-initiatives-cybersecurity-traineeship-launches-careers" hreflang="en">Commonwealth Cyber Initiative’s Cybersecurity Traineeship launches careers in cybersecurity</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">February 12, 2024</div></div></li> </ul></div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/1011" hreflang="en">Institute for Digital InnovAtion (IDIA)</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/391" hreflang="en">College of Humanities and Social Sciences</a></div> <div class="field__item"><a href="/taxonomy/term/7096" hreflang="en">Mason Momentum</a></div> </div> </div> </div> </div> </div> Thu, 02 May 2024 13:39:13 +0000 Colleen Rich 111891 at