The human subjects research (HSR) studies performed under ReSCIND have amassed a wealth of data including cyber and human psychological data, under differing conditions to measure and record cognitive vulnerabilities and human cyber behavior.
Loss Aversion—Endowment Effect
Cognitive and cyber skills surveys, plus two 1-hour cyber tasks
34 participants on cyber task with threatened loss of resources
Surveys and skills data; cyber activity, Splunk logs, and session data
Representativeness—Base Rate Neglect
Cognitive and cyber skills surveys, plus two 1-hour cyber tasks
34 participants on cyber task with out-of-place vulnerabilities
Surveys and skills data; cyber activity, Splunk logs, and session data
1-hour series of funfair-themed games to measure cognitive effects such as risky choice and near miss effect that align with cyber tasks in “Gold” exercise
Online undergraduate students and cyber experts
Skills test, general (non-cyber) behavioral data
Gold Tier Cyber Exercise
2-6 hour open CTF with sequenced tasks
Online undergraduate students and cyber experts who passed a cyber skills test. Partially overlaps with Silver tier “Funfair” participants
Docker and system logs, task tracking, Falco logs, PCAP, Snort & Suricata, and task metrics
Narrative: General Cyber CogVuln Study
Evaluated 17+ CogVulns found via established methods in independent, localized cyber decisions (cyber isomorphs)
420 participants who passed a cyber knowledge screener
Psychometric data, questionnaires, timing, and self-reports
Narrative: Situated Cyber CogVuln Study
Evaluated multiple CogVulns in decision points situated within 6 cyber narratives following a cyber attack chain
111 cyber expert participants who passed a knowledge screener
Psychometric data, questionnaires, timing, and self-reports
Narrative: On-Range Cyber Attack CogVuln Exercise
Evaluating presence and activation of CogVulns given broad direction to perform cyber attacks within a rich cyber environment
Currently In Progress
Naturalistic Cyber Attack Behavior with Host/Network Manipulations
2-day cyber exercise attacking a single network with multiple key objectives and intermittent intelligence about the task
Host/Network Manipulations include realistic but potentially erroneous information such as mislabeled host names, applications, accounts, or files containing outdated credentials
19 red team participants who passed a cyber screening questionnaire
Screening and demographics, self-reports and psychometric data, PCAP, Suricata, keylog, and terminal histories
Naturalistic Cyber Attack Behavior
2-day cyber exercise attacking a single network with multiple key objectives and intermittent intelligence about the task
20 red team participants who passed a cyber screening questionnaire
Screening and demographics, self-reports and psychometric data, PCAP, Suricata, keylog, and terminal histories
Naturalistic Cyber Attack Behavior with Host/Network Network Manipulations
2-day cyber exercise attacking a single network with multiple key objectives and intermittent intelligence about the task
Host/Network Manipulations include realistic but potentially erroneous information such as mislabeled host names, applications, accounts, or files containing outdated credentials
22 red team participants who passed a cyber screening questionnaire
Screening and demographics, self-reports and psychometric data, PCAP, Suricata, keylog, and terminal histories
SaikoCTF: In-Person HITBSec Conference
2.5-hours CTF event with six challenges designed to elicit selected CogVulns
Cyber conference attendees at Hack in The Box Security (HITBSec) Conference in Thailand
11-hour CTF event with ten challenges designed to elicit selected CogVulns
CTF players recruited worldwide online
Cyber data, CogVuln & individual difference measures survey data
SaikoCTF: Online Game “pwn”
11-hour CTF event with ten challenges designed to elicit selected CogVulns
CTF players recruited worldwide online
Cyber data, CogVuln & individual difference measures survey data
SaikoCTF: Online Game “wicked6”
11-hour CTF event with ten challenges designed to elicit selected CogVulns
Attendees of the online Wicked6 Cyber Games Virtual Global Hack & Chat Event
Cyber data, CogVuln & individual difference measures survey data
SaikoCTF: Online Game “mayday”
11-hour CTF event with ten challenges designed to elicit selected CogVulns
CTF players recruited worldwide online
Cyber data, CogVuln & individual difference measures survey data
Currently in progress
Multi-Country Heuristics Online Study
CogVulns and individual difference questionnaires and surveys to measure the magnitude of cognitive effects and individual differences across geographically distributed populations
Over 1,200 participants from 30 countries worldwide
Big Five, GRiPS, ABC, CRT-3, ADMC, Overclaiming, other surveys, and self-reports