Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners

08/14/2023
by   Andreas Happe, et al.
0

Offensive security-tests are a common way to pro-actively discover potential vulnerabilities. They are performed by specialists, often called penetration-testers or white-hat hackers. The chronic lack of available white-hat hackers prevents sufficient security test coverage of software. Research into automation tries to alleviate this problem by improving the efficiency of security testing. To achieve this, researchers and tool builders need a solid understanding of how hackers work, their assumptions, and pain points. In this paper, we present a first data-driven exploratory qualitative study of twelve security professionals, their work and problems occurring therein. We perform a thematic analysis to gain insights into the execution of security assignments, hackers' thought processes and encountered challenges. This analysis allows us to conclude with recommendations for researchers and tool builders to increase the efficiency of their automation and identify novel areas for research.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/04/2022

An Empirical Study of Automation in Software Security Patch Management

Several studies have shown that automated support for different activiti...
research
07/30/2023

"False negative – that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

The demand for automated security analysis techniques, such as static an...
research
12/30/2020

Security Engineering for ISO 21434

The ISO 21434 is a new standard that has been proposed to address the fu...
research
07/24/2022

Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches

The thesis advances the field of software security by providing knowledg...
research
12/21/2021

Well Begun is Half Done: An Empirical Study of Exploitability Impact of Base-Image Vulnerabilities

Container technology, (e.g., Docker) is being widely adopted for deployi...
research
09/28/2021

Data-driven insight into the puzzle-based cybersecurity training

Puzzle-based training is a common type of hands-on activity accompanying...
research
08/22/2023

Recording of 50 Business Assignments

One of the main use cases of process mining is to discover and analyze h...

Please sign up or login with your details

Forgot password? Click here to reset