Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Automation or Innovation?

Automation or Innovation?

Scheduled Pinned Locked Moved Uncategorized
4 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • aristot73@infosec.exchangeA This user is from outside of this forum
    aristot73@infosec.exchangeA This user is from outside of this forum
    aristot73@infosec.exchange
    wrote last edited by
    #1

    Automation or Innovation?

    Absorption or Containment?

    "Does AI-assisted vulnerability discovery represent a categorical innovation in offensive cyber capability — a new class of finding previously unreachable by any combination of human and tool — or does it represent the automation and scaling of methods that already existed in the security-research repertoire?

    The policy responses appropriate to each framing diverge sharply."

    https://codeberg.org/tzafaar/Buffers_overflow_into_policy/src/branch/main/briefing%20notes/innovation-or-automation-v5.md

    aristot73@infosec.exchangeA 1 Reply Last reply
    1
    0
    • aristot73@infosec.exchangeA aristot73@infosec.exchange

      Automation or Innovation?

      Absorption or Containment?

      "Does AI-assisted vulnerability discovery represent a categorical innovation in offensive cyber capability — a new class of finding previously unreachable by any combination of human and tool — or does it represent the automation and scaling of methods that already existed in the security-research repertoire?

      The policy responses appropriate to each framing diverge sharply."

      https://codeberg.org/tzafaar/Buffers_overflow_into_policy/src/branch/main/briefing%20notes/innovation-or-automation-v5.md

      aristot73@infosec.exchangeA This user is from outside of this forum
      aristot73@infosec.exchangeA This user is from outside of this forum
      aristot73@infosec.exchange
      wrote last edited by
      #2

      ☝️ @meartur

      meartur@infosec.exchangeM 1 Reply Last reply
      0
      • aristot73@infosec.exchangeA aristot73@infosec.exchange

        ☝️ @meartur

        meartur@infosec.exchangeM This user is from outside of this forum
        meartur@infosec.exchangeM This user is from outside of this forum
        meartur@infosec.exchange
        wrote last edited by
        #3

        @aristot73 Agreed! I'd add that cost collapse isn't the whole story though. Some searches wouldn't happen at any price because some software/bugs might simply be uninteresting to people.

        aristot73@infosec.exchangeA 1 Reply Last reply
        0
        • meartur@infosec.exchangeM meartur@infosec.exchange

          @aristot73 Agreed! I'd add that cost collapse isn't the whole story though. Some searches wouldn't happen at any price because some software/bugs might simply be uninteresting to people.

          aristot73@infosec.exchangeA This user is from outside of this forum
          aristot73@infosec.exchangeA This user is from outside of this forum
          aristot73@infosec.exchange
          wrote last edited by
          #4

          @meartur fully agree! there must be a measurable "return" to justify any, even negligible, investment.

          The best source i could find on the attacker perspective on this issue was the paper below.

          According to the the paper, attackers will squeeze all the juice out of a working exploit before looking for a new one. Attackers will keep "harvesting" the same field (subset of software) as long as it remains fertile (i love analogies 🙂).

          This was pre-LLM. We may have to wait for some empirical evidence...on modern farming practices.

          Allodi, L., Massacci, F. and Williams, J. (2022), "The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures."

          Checking your browser - reCAPTCHA

          favicon

          (pmc.ncbi.nlm.nih.gov)

          1 Reply Last reply
          0
          • R relay@relay.infosec.exchange shared this topic
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • World
          • Users
          • Groups