The human subjects research (HSR) studies performed under ReSCIND have amassed a wealth of data including cyber and human psychological data, under differing conditions to measure and record cognitive vulnerabilities and human cyber behavior.
Loss Aversion—Endowment Effect
Cognitive and cyber skills surveys, plus two 1-hour cyber tasks.
34 participants on cyber task with threatened loss of resources.
Surveys and skills data; cyber activity, Splunk logs, and session data.
Representativeness—Base Rate Neglect
Cognitive and cyber skills surveys, plus two 1-hour cyber tasks.
34 participants on cyber task with out-of-place vulnerabilities.
Surveys and skills data; cyber activity, Splunk logs, and session data.
1-hour series of funfair-themed games to measure cognitive effects such as risky choice and near miss effect that align with cyber tasks in “Gold” exercise
Online undergraduate students and cyber experts
Skills test, general (non-cyber) behavioral data
Gold Tier Cyber Exercise
2-6 hour open CTF with sequenced tasks
Online undergraduate students and cyber experts who passed a cyber skills test. Partially overlaps with Silver tier “Funfair” participants
Docker and system logs, task tracking, Falco logs, PCAP, Snort & Suricata, and task metrics
Narrative: General Cyber CogVuln Study
Cyber narrative with decision points designed to correlate multiple CogVulns to cyber contexts (cyber isomorphs)
420 participants who passed a cyber knowledge screener
Psychometric data, questionnaires, timing, and self-reports
Small Scale Cyber Exercise Large Scale Cyber Exercise
Currently In Progress
Naturalistic Cyber Attack Behavior with Host/Network Manipulations
Screening and demographics, self-reports and psychometric data, PCAP, Suricata, keylog, and terminal histories
19 red team participants who passed a cyber screening questionnaire
Host/Network Manipulations include realistic but potentially erroneous information such as mislabeled host names, applications, accounts, or files containing outdated credentials
2-day cyber exercise attacking a single network with multiple key objectives and intermittent intelligence about the task
Naturalistic Cyber Attack Behavior
Screening and demographics, self-reports and psychometric data, PCAP, Suricata, keylog, and terminal histories
20 red team participants who passed a cyber screening questionnaire
2-day cyber exercise attacking a single network with multiple key objectives and intermittent intelligence about the task
Naturalistic Cyber Attack Behavior with Host/Network Network Manipulations
2-day cyber exercise attacking a single network with multiple key objectives and intermittent intelligence about the task
Host/Network Manipulations include realistic but potentially erroneous information such as mislabeled host names, applications, accounts, or files containing outdated credentials
22 red team participants who passed a cyber screening questionnaire
Screening and demographics, self-reports and psychometric data, PCAP, Suricata, keylog, and terminal histories
SaikoCTF: HITBSec Conference
Cyber data, physiological data, survey data
Cyber conference attendees at HITBSec Conference in Thailand
5 hours of multiple mini CTF events designed to elicit selected CogVulns
SaikoCTF: ECSC Conference
5 hours of multiple mini CTF events designed to elicit selected CogVulns
Cyber conference attendees at ECSC Conference in Italy
Cyber data, physiological data, survey data
Multi-Country Heuristics Study
Online questionnaires and surveys to measure magnitude of cognitive effects and individual differences across geographically distributed populations
Over 500 participants from 30 countries worldwide
Big Five, GRiPS, ABC, CRT-3, other surveys, and self reports
SaikoCTF: EkoParty Conference
5 hours of multiple mini CTF events designed to elicit selected CogVulns
Cyber conference attendees at EkoParty Conference in Argentina