<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:admin="http://webns.net/mvcb/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:content="http://purl.org/rss/1.0/modules/content/">

    <channel>

    <title><![CDATA[Deception Group]]></title>
    <link>https://www.cerias.purdue.edu/site/deception</link>
    <description><![CDATA[Deception Group]]></description>
    <dc:language>en</dc:language>
    <dc:creator>webmaster@cerias.purdue.edu</dc:creator>
    <dc:rights>Copyright 2026</dc:rights>
    <dc:date>2026-02-19T14:41:24+00:00</dc:date>
    <admin:generatorAgent rdf:resource="https://ellislab.com/" />


    <item>
      <title><![CDATA[Acknowledgements]]></title>
      <link>https://www.cerias.purdue.edu/site/deception/Acknowledgements</link>
      <guid>https://www.cerias.purdue.edu/site/deception/Acknowledgements</guid>
      <description><![CDATA[<table border="0" width="100%" cellpadding="0" cellspacing="0" [removed]>
<tr>
<td>
<a href="http://www.cerias.purdue.edu"><img src="http://spaf.cerias.purdue.edu/images/clearclogo.gif" height="64"   alt="CERIAS Logo" title="CERIAS" /></a>
</td>
<td>
<a href="http://www.northropgrumman.com/Pages/default.aspx"><img title="Northrop Grumman" src="http://www.cerias.purdue.edu/site/images/uploads/northrop_grumman.png" height="37" width="208"  alt="Northrop Grumman Logo" float="left" /></a>
</td>
<td>
<a href="http://www.nsf.gov"><img title="NSF" src="/assets/images/nsf4.jpg" height="64" width="64" alt="NSF Logo" class="img-fluid" float="left" /></a>
</td>
</tr>
</table>

<p><br /></p>

<p>The work in this project has been partially supported by funding from <a href="https://www.cerias.purdue.edu">CERIAS</a> at Purdue University.</p>

<p>Portions of this work conducted in 2014-2015 were supported by Northrop Grumman through its <a href="http://www.northropgrumman.com/Capabilities/CybersecurityResearchConsortium/Pages/default.aspx">Cybersecurity Research Consortium</a>.</p>

<p>Portions of this  work conducted in 2015-2017 were supported by the <a href="http://www.nsf.gov">National Science Foundation</a> grant #1548114.</p>

<p>All of the support of this project is gratefully acknowledged.</p>

<p>&nbsp;</p>

<hr width="85%" />

<p>&nbsp;</p>

<p>Any opinions, findings, conclusions or recommendations expressed on this website or in any of our materials are those of the author(s) and do not necessarily reflect the views of the National Science Foundation, the Northrop Grumman Corporation, CERIAS, or Purdue University.</p>
]]></description>
      <dc:subject><![CDATA[Acknowledgements]]></dc:subject>
      <dc:date>2026-02-19T14:41:24+00:00</dc:date>
    </item>

    <item>
      <title><![CDATA[People]]></title>
      <link>https://www.cerias.purdue.edu/site/deception/People</link>
      <guid>https://www.cerias.purdue.edu/site/deception/People</guid>
      <description><![CDATA[<p>The faculty currently involved are <a href="https://www.cerias.purdue.edu/site/people/faculty/view/2">Mikhail Atallah</a>, <a href="https://www.cerias.purdue.edu/site/people/faculty/view/705">Saurabh Bagchi</a>,  and <a href="http://spaf.cerias.purdue.edu">Gene Spafford</a>;  Professor Spafford is the director of the project.</p>

<p><a href="https://www.linkedin.com/in/cyberleaders/">Douglas Rapp</a> is a PhD student working on the project as of 2021.</p>

<p>Former grad student <a href="https://www.linkedin.com/pub/christopher-gutierrez/9/6b/662">Chris Gutierrez</a> is now a Security Solutions Research Scientist at Intel.</p>

<p><a href="https://www.linkedin.com/in/meshekah/">Mohammed Almeshekah</a> has completed his PhD and left Purdue to take a faculty position at <a href="http://ksu.edu.sa/en/">King Saud University</a>. His PhD dissertation, <cite>Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses</cite>, is <a href="http://www.cerias.purdue.edu/apps/reports_and_papers/view/4868">available online</a> in the CERIAS library.</p>

<p><a href="https://www.linkedin.com/in/jkavery">Jeff Avery</a> has finished his PhD and accepted a full-time position post graduation as a Software Engineer in the Future Technical Leaders program at Northrop Grumman. His PhD dissertation, <cite>The Application of Deception to Software Security Patching</cite> is <a href="https://www.cerias.purdue.edu/apps/reports_and_papers/view/5013">available online</a> in the CERIAS library.</p>

<p>We are interested in collaboration with others, at Purdue University or elsewhere.  Please <a href="https://www.cerias.purdue.edu/site/deception/For-More-Information-or-Contact-Us/">contact us</a> for details.</p>
]]></description>
      <dc:subject><![CDATA[People]]></dc:subject>
      <dc:date>2026-02-19T14:23:38+00:00</dc:date>
    </item>

    <item>
      <title><![CDATA[index]]></title>
      <link>https://www.cerias.purdue.edu/site/deception</link>
      <guid>https://www.cerias.purdue.edu/site/deception</guid>
      <description><![CDATA[<h2>About Our Group</h2>

<p>In everyday security, deception plays a prominent role in our physical world security. We leave lights on to deter thieves by deceiving them to think someone is inside. We may further put up signs that warn &#8220;Beware of the Dog&#8221; to cast doubt on the nature of our defenses. Inside, we may place our valuables in a safe, but hide the safe behind a painting.</p>

<p>Over history, deception has evolved to find its natural place in our societies and eventually our technical systems. Deception and decoy-based mechanisms have been used in cyber security for more than two decades in techniques such as honeypots and obfuscation.</p>

<p>Our group is investigating how deception can be used to improve the security of computers and networks. This site provides a summary and reference of the work we have done with links to more in-depth information.</p>

<h2>News</h2>

<ul>
<li>After a hiatus of a few years, we&#8217;re coming back!  The next topic for research is how/if we can use deception to help protect ICS systems.</li>
<li>Purdue did a  <a href="https://www.purdue.edu/newsroom/releases/2019/Q1/deceiving-the-deceivers.html">short news story</a> on Spaf&#8217;s work in deception</li>
<li>Spaf is on sabbatical 2018-2019, and is working on deception technologies with Sandia Laboratories and the US Department of Defense.  Check back in late 2019 for possible new developments.</li>
<li>Chris Gutierrez successfully defended his thesis, and becomes Dr. Gutierrez on December 17, 2017.  He has taken a position at Intel Corporation</li>
<li>Jeff Avery successfully defended his thesis, and became Dr. Avery on August 5th, 2017.  He took a position at Northrop Grumman</li>
<li>Spaf was interviewed at RSA 2017 about deception.  Check out <a href="https://www.youtube.com/watch?v=8qE7kT-SkRM">the video</a>!</li>
<li>Our paper entitled <cite>Ghost Patches: Faux Patches for Faux Vulnerabilities</cite> was presented at the <a href ="https://ifip.hal.science/IFIP-AICT-502/hal-01648988"> IFIP SEC 17 </a> conference. (Link for the paper coming soon.)</li>
<li>Our paper entitled <cite>Offensive Deception in Computing</cite> was presented at the <a href ="http://www.academic-conferences.org/conferences/iccws/"> ICCWS 17 </a> conference. </li>
<li> Our paper <a href="http://dl.acm.org/citation.cfm?doid=2997655.2996457"> Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords
</a> was published in ACM Transactions on Privacy and Security (TOPS), v19(3), Dec 2016, <a href="http://dl.acm.org/citation.cfm?doid=2997655.2996457">DOI 10.1145/2996457.</a> </li>
<li>A new book on cyber deception includes a chapter on our work.  See the <a href="https://www.cerias.purdue.edu/site/deception/Papers-and-Presentations/#chapter">Papers and Presentations</a> page for details.</li>
<li>Our paper on <a href="https://www.cerias.purdue.edu/site/deception/Deceptive_Tools_and_Software#ersatzp"> ersatz passwords</a> was presented at the <a href="https://www.acsac.org/2015/">ACSAC 15</a> conference.<br />
<b>Update!</b> This paper won the <b>conference best paper</b> award!
</li>
<li> <a href="https://www.linkedin.com/in/meshekah/">Mohammed Almeshekah</a> has completed his PhD and left Purdue to take a faculty position at <a href="http://ksu.edu.sa/en/">King Saud University</a>. His PhD dissertation, <cite>Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses</cite>, is <a href="http://www.cerias.purdue.edu/apps/reports_and_papers/view/4868">available online</a> in the CERIAS library.
</li>
<li>We have received an NSF grant to support portions of our work!  See the <a href="https://www.cerias.purdue.edu/site/deception/Acknowledgements" title="Acknowledgements">Acknowledgements</a> page for specifics.
</li>
</ul>

<h2>Site Map</h2>

<p><a href="https://www.cerias.purdue.edu/site/deception/People" title="People">People</a></p>

<p><a href="https://www.cerias.purdue.edu/site/deception/Papers-and-Presentations" title="Papers-and-Presentations">Papers and Presentations</a></p>

<p><a href="https://www.cerias.purdue.edu/site/deception/Deceptive-Tools-and-Software" title="Deceptive-Tools-and-Software">Deceptive Tools and Software</a></p>

<p><a href="https://www.cerias.purdue.edu/site/deception/Press-Coverage-and-Mentions" title="Press-Coverage-and-Mentions">Press Coverage and Mentions</a></p>

<p><a href="https://www.cerias.purdue.edu/site/deception/For-More-Information-or-Contact-Us" title="For-More-Information-or-Contact-Us">For More Information or Contact Us</a></p>

<p><a href="https://www.cerias.purdue.edu/site/deception/External-Resources" title="External-Resources">External Resources</a></p>

<p><a href="https://www.cerias.purdue.edu/site/deception/Acknowledgements" title="Acknowledgements">Acknowledgements</a></p>
]]></description>
      <dc:subject><![CDATA[index]]></dc:subject>
      <dc:date>2026-02-19T14:21:10+00:00</dc:date>
    </item>

    <item>
      <title><![CDATA[Papers and Presentations]]></title>
      <link>https://www.cerias.purdue.edu/site/deception/Papers-and-Presentations</link>
      <guid>https://www.cerias.purdue.edu/site/deception/Papers-and-Presentations</guid>
      <description><![CDATA[<h2>Discussing the Use of Deception</h2>

<ul>

<li>Avery, J., Almeshekah, M., & Spafford, E. (2017). <cite><a href="http://search.proquest.com/docview/1897684061?pq-origsite=gscholar">Offensive Deception in Computing.</a></cite> In 12th International Conference on Cyber Warfare and Security 2017 Proceedings (p. 23).</li>

<li><cite> <a href="https://www.cerias.purdue.edu/assets/symposium/2016-posters/0C6-886.pdf"> Deceptive Memory Systems - Countering Antiâ€Forensics with Deception</a>, </cite> C. N. Gutierrez, E. H. Spafford, and S. Bagchi. 17th Annual CERIAS Information Security Symposium: Poster, West Lafayette, IN, USA, April 2016. Best Poster Award, 3rd Place.</li>

<li><cite><a href="https://www.cerias.purdue.edu/assets/symposium/2016-posters/BD3-EE8.pdf">The Cost of Deception, </a>,</cite> J. Avery, C. N. Gutierrez, E. H. Spafford. 17th Annual CERIAS Information Security Symposium: Poster, West Lafayette, IN, USA, April 2016. </li>

<li>Chapter 2 in <cite><a id="chapter" href="http://www.springer.com/cn/book/9783319326979">Cyber Deception: Building the Scientific Foundation</a></cite>, entitled <i>Cyber Security Deception</i>, by M. Almeshekah and E. H. Spafford. 2016</li>

<li><cite><a href="http://www.cerias.purdue.edu/assets/symposium/2015-posters/494-E03.pdf">Deception in Computing: Where and How it Has Been Used</a></cite>, J. Avery,&nbsp;&nbsp;C. N. Gutierrez, M. Almeshekah,&nbsp;S. 
Bagchi, and E. H. Spafford,&nbsp;16th Annual CERIAS Information Security Symposium: Poster, West Lafayette, IN, USA, March 2015.</li>

<li><cite><a href="https://www.meshekah.com/research/publications_files/using_deceptive_information.pdf">Using Deceptive Information in Computer Security Defenses</a></cite>, M. Almeshekah and E. H. Spafford, International Journal of Cyber Warfare and Terrorism (IJCWT), 4 (3), 46-58, July-September 2014, IGI Global.</li>

<li><cite>The Case of Using Negative (Deceiving) Information in Data Protection</cite>,&nbsp;M. Almeshekah&nbsp;and E. Spafford, in Proceedings of the 9th International Conference on Cyber Warfare and Security ICCWS-2014, ISSN: 2048-9870, Academic Conferences and Publishing International Limited, March 2014.<br>[<a href="https://www.meshekah.com/research/publications_files/using_negative_information_.pdf">paper</a>] . [<a href="http://www.cerias.purdue.edu/assets/symposium/2014-posters/822-479.pdf">15th CERIAS Symposium: poster</a>&nbsp;(Best Poster Award)]</li>

<li><cite><a href="http://www.cerias.purdue.edu/apps/reports_and_papers/view/4702">&#8220;Improving Security Using Deception</a></cite>, M. Almeshekah, E. Spafford and M. Atallah, The Center for Education and Research in Information Assurance and Security: Technical Report (CERIAS TR 2013-13).</li>

<li><a href="/site/uploads/deception/Truth_Consequences.pdf">A Presentation, </a><cite>Truth and Consequences</cite>, that Spaf has given recently in several places, including University of Central Florida and Texas A&amp;M University.</li>

</ul>

<h2>Systemization, Modeling and Integrating of Deception</h2>

<ul><li><cite>A Hypergame Analysis for ErsatzPasswords</cite>; Christopher Gutierrez, Mohammed Almeshekah, Eugene Spafford and Saurabh Bagchi; in proceedings of  33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection, Poznan, Poland.  </li>
<li><cite><a href="http://www.cerias.purdue.edu/apps/reports_and_papers/view/4904">Modeling Deception In Information Security As A Hypergame â€“ A Primer</a>;&nbsp; Christopher Gutierrez, Mohammed Almeshekah, Eugene H. Spafford, Saurabh Bagchi, Jeff Avery, and Paul Wood; CERIAS Tech Report CERIAS TR 2016-5; July 2016.</li>
<li><cite><a href="http://www.cerias.purdue.edu/assets/symposium/2015-posters/B4B-3D9.pdf">Modeling Deception In Information Security As A Hypergame â€” A Primer</a></cite>;&nbsp; C. N. Gutierrez,&nbsp;M. Almeshekah, J. Avery, S. Bagchi, and E. H.Spafford,&nbsp;16th Annual CERIAS Information Security Symposium: Poster, West Lafayette, IN, USA, March 2015.</li>

<li><cite><a href="https://www.meshekah.com/research/publications_files/planning_and_integrating_de.pdf">Planning and Integrating Deception into Computer Security Defenses</a></cite>, M. Almeshekah and E. H. Spafford, New Security Paradigms Workshop (NSPWâ€™14), 15-18 September 2014, Victoria, BC, Canada.</li>
</ul>

<h2>Using Deception in Authentication</h2>

<ul><li><a href="http://dl.acm.org/citation.cfm?id=2996457"><cite>Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords</cite></a>; Christopher N. Gutierrez, Mohammed H. Almeshekah, Eugene H. Spafford, Mikhail J. Atallah, and Jeff Avery. ACM Trans. Priv. Secur. 19, 3, Article 9 (December 2016), 30 pages. DOI: https://doi.org/10.1145/2996457 [<a href="https://www.cerias.purdue.edu/assets/symposium/2016-posters/2E3-3E9.pdf" [removed]>17th CERIAS Symposium Poster, 1st Place</a>] [<a href="https://www.youtube.com/watch?v=CWt1Y_QtHuc">Video Presentation</a>]</li> 

<li><cite> <a href="https://www.cerias.purdue.edu/assets/symposium/2016-posters/0C6-886.pdf"> Deceptive Memory Systems - Countering Antiâ€Forensics 

<li><a href="http://dl.acm.org/citation.cfm?id=2818015&CFID=568540268&CFTOKEN=42816474"><cite>ErsatzPasswords: Ending Password Cracking and
Detecting Password Leakage</cite></a>; M. Almeshekah, C. N. Gutierrez, M. Atallah and E.H.  Spafford; pp. 311-320; proceedings of ACSAC 2015, Universal City, CA, Dec 2015.</li>
<li><cite><a href="https://www.meshekah.com/research/publications_files/password_exposure_ifip_sec1.pdf">Enhancing Passwords Security using Deceptive Covert Communication</a></cite>; M. Almeshekah, M. Atallah and E. H. Spafford, International Conference on ICT Systems Security and Privacy Protection, IFIP SECâ€™15, May 26-28, 2015, Hamburg, Germany (to appear).</li>

<li><cite>ErsatzPasswords â€“ Ending Passwords Cracking</cite>,&nbsp;M. Almeshekah, C. N. Gutierrez, M. Atallah and E.H.  Spafford.[<a href="http://www.cerias.purdue.edu/apps/reports_and_papers/view/4831" [removed]>Technical Report</a>] . &nbsp;[<a href="http://www.cerias.purdue.edu/assets/symposium/2015-posters/0D5-AED.pdf" [removed]>16th CERIAS &nbsp;Symposium: Poster</a>] . [<a href="https://github.com/cngutierr/ErsatzPassword" target="_blank" [removed]>Implementation</a>] . [<a href="https://www.meshekah.com/research/ersatz-passwords-cracking.html" [removed]>FAQs</a>]</li>

<li><cite><a href="http://www.cerias.purdue.edu/apps/reports_and_papers/view/4832">Defending against Password Exposure using Deceptive Covert Communication</a></cite>, M. Almeshekah, M. Atallah and E. H. Spafford, The Center for Education and Research in Information Assurance and Security: Technical Report (CERIAS TR 2015-3).</li>

</ul>

<h2>Deceptive Patching</h2>

<ul>
<li>Jeffrey Avery and John Ross Wallrabenstein. <cite>Formally modeling deceptive patches using a game-based approach</cite>, in Computers & Security, Elsevier, v75 pp 182-190, March 2018. [<a href="https://doi.org/10.1016/j.cose.2018.02.009">Paper</a>]
<li>Jeff Avery. <cite>The Application of Deception to Software Security Patching</cite> Purdue University Computer Science,  Ph.D. Dissertation and CERIAS TR 2017-03, August 2017. [<a href="https://www.cerias.purdue.edu/apps/reports_and_papers/view/5013">PhD disseration</a>]</li>
<li>Avery, J., & Spafford, E. H. (2017, May). <cite>Ghost Patches: Fake Patches for Fake Vulnerabilities.</cite> In IFIP International Conference on ICT Systems Security and Privacy Protection (pp. 399-412). Springer, . [<a href="https://link.springer.com/chapter/10.1007/978-3-319-58469-0_27">Paper</a>]. </li>
<li>CERIAS Symposium, &#8220;Ghost Patches: Faux Patches for Faux Vulnerabilities&#8221;, 2017 [<a href="https://www.cerias.purdue.edu/symposium/index.php/posters/year/2017/62A-3F4">Poster</a>]</li>
</ul>

<h2>Deceptive Memory</h2>

<ul>
<li> Christopher N. Gutierrez, Eugene H. Spafford, Saurabh Bagchi, Thomas Yurek; <a href="https://www.sciencedirect.com/science/article/pii/S016740481730281X?via=ihub"><cite>Reactive Redundancy for Data Destruction Protection (R2D2)</cite></a>; v 72, pp. 184-201; Computers & Security; Elsevier; May 2018.</li>

</ul>

<h2>Dissertations and Theses</h2>

<ul>
<li><a href="http://www.cerias.purdue.edu/apps/reports_and_papers/view/4868"><cite>Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses</cite></a>, M. Almeshekah, Purdue University Computer Science,  Ph.D. Dissertation and CERIAS TR 2015-11, August 2015.</li>
<li><a href="https://www.cerias.purdue.edu/apps/reports_and_papers/view/5013"><cite>The Application of Deception to Software Security Patching</cite></a>, J. Avery. Purdue University Computer Science,  Ph.D. Dissertation and CERIAS TR 2017-03, August 2017.</li>
<li><a href="https://www.cerias.purdue.edu/apps/reports_and_papers/view/5018"><cite>Deceptive Memory Systems</cite></a>, C. N. Gutierrez. Purdue University Computer Science,  Ph.D. Dissertation and CERIAS TR 2017-05, December 2017.</li>
</ul>
]]></description>
      <dc:subject><![CDATA[Papers and Presentations]]></dc:subject>
      <dc:date>2026-01-27T15:51:40+00:00</dc:date>
    </item>

    <item>
      <title><![CDATA[Deceptive Tools and Software]]></title>
      <link>https://www.cerias.purdue.edu/site/deception/Deceptive-Tools-and-Software</link>
      <guid>https://www.cerias.purdue.edu/site/deception/Deceptive-Tools-and-Software</guid>
      <description><![CDATA[<h2 id="ersatzp">Ersatz Passwords</h2>

<p>We modified how Linux-based operating systems store userâ€™s passwords and incorporated a machine dependent machine function in the process. When an attacker steals the hashed passwords file &#40;e.g., etc/shadow&#41; and tries to crack the password, ersatz â€œfakeâ€ passwords are returned instead. The design of this tool can be found in <a href="http://www.cerias.purdue.edu/apps/reports_and_papers/view/4831">this paper</a> and the code, which was mainly developed by Christopher&nbsp;Gutierrez, can be found <a href="https://github.com/cngutierr/ErsatzPassword" target="_blank">here</a>.</p>
]]></description>
      <dc:subject><![CDATA[Deceptive Tools and Software]]></dc:subject>
      <dc:date>2022-04-07T18:04:37+00:00</dc:date>
    </item>

    <item>
      <title><![CDATA[Press Coverage and Mentions]]></title>
      <link>https://www.cerias.purdue.edu/site/deception/Press-Coverage-and-Mentions</link>
      <guid>https://www.cerias.purdue.edu/site/deception/Press-Coverage-and-Mentions</guid>
      <description><![CDATA[<h2>Some Press and Blog References</h2>

<ul>
<li><p><a href="https://www.darkreading.com/vulnerabilities---threats/deception-why-its-not-just-another-honeypot/a/d-id/1330506?">Deception: Why It&#8217;s Not Just Another Honeypot</a></p></li>
<li><p><a href="https://zeltser.com/deception-security-tactics/">Reflections Upon Deception-Based Security Tactics</a></p></li>
</ul>
]]></description>
      <dc:subject><![CDATA[Press Coverage and Mentions]]></dc:subject>
      <dc:date>2018-02-12T01:39:47+00:00</dc:date>
    </item>

    <item>
      <title><![CDATA[External Resources]]></title>
      <link>https://www.cerias.purdue.edu/site/deception/External-Resources</link>
      <guid>https://www.cerias.purdue.edu/site/deception/External-Resources</guid>
      <description><![CDATA[<h2>Vendors</h2>

<p>In the last few years several vendors have sprung up marketing products with deception as a basic component.  Here are the ones we know about.  Let us know if there are any we are missing.</p>

<ul>
<li><a href="http://www.acalvio.com">Acalvio</a></li>
<li><a href="http://www.attivonetworks.com">Attivo Networks</a></li>
<li><a href="http://www.countercraft.eu">Countercraft</a></li>
<li><a href="http://www.illusivenetworks.com">Illusive Networks</a></li>
<li><a href="http://www.topspinsec.com">TopSpin Security</a></li>
<li><a href="http://www.trapx.com">TrapX Security</a></li>
</ul>
]]></description>
      <dc:subject><![CDATA[External Resources]]></dc:subject>
      <dc:date>2017-02-24T22:03:14+00:00</dc:date>
    </item>

    <item>
      <title><![CDATA[Events and Press Coverage]]></title>
      <link>https://www.cerias.purdue.edu/site/deception/Events-and-Press-Coverage</link>
      <guid>https://www.cerias.purdue.edu/site/deception/Events-and-Press-Coverage</guid>
      <description><![CDATA[<p><li><strong>May 19th, 2015&nbsp;</strong><strong>â€”&nbsp;</strong>Simon Campanello published a story in Swedish about our Ersatz Passwords work titled&nbsp;<a href="http://www.idg.se/2.1085/1.627376/fejklosenord-ska-stoppa-hackare-fran-att-dra-nytta-av-lackta-databaser" target="_blank">â€œFejklÃ¶senord ska stoppa hackare frÃ¥n att dra nytta av lÃ¤ckta databaserâ€</a>, at IDG.se.</li></p>

<p><li><strong>May 18th, 2015</strong>&nbsp;â€” Jeremy Kirk wrote a story at CIO.com about our <a href="https://www.cerias.purdue.edu/site/deception/Deceptive_Tools_and_Software/#ersatzp">Ersatz Passwords </a>work titled&nbsp;<a href="http://www.cio.com/article/2924014/login-system-supplies-fake-passwords-to-hackers.html" target="_blank" style="">â€œLogin system supplies fake passwords to hackersâ€</a>. Similar stories appeared at InfoWorld.com, NetworkWorld.com, PCWorld.com, DataBreaches.net, ComputerWorld.com and CSOonline.com.</li></p>

<p><li><span ><strong>March 29th-30th, 2015&nbsp;</strong><strong >â€”</strong><span >&nbsp;Mohammed Almeshekah and Prof. Spafford presented our work at the Northrop Grumman Cybersecurity Research Consortium (<a href="http://www.northropgrumman.com/Capabilities/CybersecurityResearchConsortium/Pages/default.aspx" target="_blank">CRC</a>)&nbsp;spring&nbsp;event at Washington, DC.</li></p>

<p><li><span ><strong>March 12th, 2015</strong> â€” Prof. Spafford gave a presentation on our work on Deception at the <a href="http://www.ci-issa.org/" target="_blank">ISSA Central Indiana Chapter</a> titled â€œ<em>Truth and Consequences</em>â€<em>.&nbsp;</em><a href="https://www.linkedin.com/in/jamesdisorbo" target="_blank">Jim DiSorbo</a> from&nbsp;<a href="https://www.wisegateit.com/" target="_blank">Wisegate</a>, the sponsors of the event, wrote a <a href="https://www.linkedin.com/pulse/ci-issa-a-night-spaf-jim-disorbo" target="_blank">summary</a> of the talk.</li></p>
]]></description>
      <dc:subject><![CDATA[Events and Press Coverage]]></dc:subject>
      <dc:date>2015-08-11T07:23:56+00:00</dc:date>
    </item>

    <item>
      <title><![CDATA[For More Information or Contact Us]]></title>
      <link>https://www.cerias.purdue.edu/site/deception/For-More-Information-or-Contact-Us</link>
      <guid>https://www.cerias.purdue.edu/site/deception/For-More-Information-or-Contact-Us</guid>
      <description><![CDATA[<p>If you have comments about anything related to this effort, you may send them in email to <a href="mailto:TellMeLies@cerias.purdue.edu">TellMeLies@cerias.purdue.edu</a>.</p>

<p>If you want to join the group&#8217;s (not highly active) mailing list, <em>Decepticons</em>, please send email with the word &#8220;subscribe&#8221; in the subject or body of the message to <a href="mailto:decepticons-request@cerias.purdue.edu?subject=subscribe&body=subscribe">decepticons-request@cerias.purdue.edu</a>.</p>
]]></description>
      <dc:subject><![CDATA[For More Information or Contact Us]]></dc:subject>
      <dc:date>2015-08-06T21:31:54+00:00</dc:date>
    </item>


    </channel>
</rss>