Deception Group

Options Search

Deception Group

About Our Group

In everyday security, deception plays a prominent role in our physical world security. We leave lights on to deter thieves by deceiving them to think someone is inside. We may further put up signs that warn “Beware of the Dog” to cast doubt on the nature of our defenses. Inside, we may place our valuables in a safe, but hide the safe behind a painting.

Over history, deception has evolved to find its natural place in our societies and eventually our technical systems. Deception and decoy-based mechanisms have been used in cyber security for more than two decades in techniques such as honeypots and obfuscation.

Our group is investigating how deception can be used to improve the security of computers and networks. This site provides a summary and reference of the work we have done with links to more in-depth information.


Site Map


Papers and Presentations

Deceptive Tools and Software

Press Coverage and Mentions

For More Information or Contact Us

External Resources



 ·   Deception Home
 ·   Categories
 ·   Title List
 ·   Recent Changes
 ·   RSS
 ·   Atom

Create or Find Page: