How can we embed cyber traps (e.g., honeytokens) into applications, at runtime, without modifying their source code?

Find out in our recent paper, which I presented at the 3rd Workshop on Active Defense and Deception (AD&D), co-located with Euro S&P 2024, in Vienna, this week.

Slides: https://zenodo.org/records/12699007
Preprint: https://arxiv.org/abs/2405.12852 (in press)

Application Layer Cyber Deception without Developer Interaction

Zenodo