CAVA: Cognitive Aid for Vulnerability Analysis
dc.contributor.author | Kim, Evelyn | |
dc.contributor.author | Fugate, Sunny | |
dc.contributor.author | Lebiere, Christian | |
dc.contributor.author | Barbieux, Aidan | |
dc.contributor.author | Buch, Jonathan | |
dc.contributor.author | Cho, Jaehoon | |
dc.contributor.author | Cranford, Edward | |
dc.contributor.author | Divita, Joseph | |
dc.contributor.author | Johnson, Jeremy | |
dc.contributor.author | Levy, Mia | |
dc.contributor.author | Maldonado, Froylan | |
dc.contributor.author | Marsh, Brianna | |
dc.contributor.author | Morrison, Donald | |
dc.contributor.author | Rego, Jocelyn | |
dc.contributor.author | Sayer, Mitchell | |
dc.contributor.author | Waagen, Alex | |
dc.contributor.author | Bhattacharyya, Rajan | |
dc.date.accessioned | 2023-12-26T18:53:46Z | |
dc.date.available | 2023-12-26T18:53:46Z | |
dc.date.issued | 2024-01-03 | |
dc.identifier.doi | 10.24251/HICSS.2024.886 | |
dc.identifier.isbn | 978-0-9981331-7-1 | |
dc.identifier.other | 5589cadd-8ea2-4d1d-881d-4067472fa613 | |
dc.identifier.uri | https://hdl.handle.net/10125/107272 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 57th Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Cyber Operations, Defense, and Forensics | |
dc.subject | closed-loop visual aid | |
dc.subject | cognitive model | |
dc.subject | software reverse engineering | |
dc.title | CAVA: Cognitive Aid for Vulnerability Analysis | |
dc.type | Conference Paper | |
dc.type.dcmi | Text | |
dcterms.abstract | Becoming a reverse engineer (RE) requires rigorous training and understanding of program structure and functionality, and experts develop heuristic strategies and intuitions from real-world experiences. This paper attempts to capture REs’ strategies and intuitions within a predictive cognitive model and demonstrate the feasibility of assisting novice REs using an intelligent recommender called CAVA (Cognitive Aid for Vulnerability Analysis). CAVA leverages physiological sensors to assess a novice’s cognitive states and provides real-time visual hints when the novice’s attention and engagement diminish. We instrumented Ghidra and conducted pilot experiments with REs. Open-loop experiments with 9 REs confirmed the feasibility of identifying novices from experts using physiological signals, and a pilot closed-loop experiment tested the feasibility of providing visual recommendations to a novice. Despite challenges in recruiting REs, our progress suggests that CAVA is a promising approach to improve novice performance and our understanding of experts’ behavior when performing complex real-world reverse engineering tasks. | |
dcterms.extent | 10 pages | |
prism.startingpage | 7377 |
Files
Original bundle
1 - 1 of 1