Embedded honeypotting

2Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Language-based software cyber deception leverages the science of compiler and programming language theory to equip software products with deceptive capabilities that misdirect and disinform attackers. A flagship example of software cyber deception is embedded honeypots, which arm live, commodity server software with deceptive attack-response and disinformation capabilities. This chapter presents a language-based approach to embedded honeypot design and implementation. Implications related to software architecture, compiler design, program analysis, and programming language semantics are discussed.

Cite

CITATION STYLE

APA

Araujo, F., & Hamlen, K. W. (2016). Embedded honeypotting. In Cyber Deception: Building the Scientific Foundation (pp. 201–231). Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free