Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities

Linan Huang, Quanyan Zhu

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Chapter 3 elaborates on three critical types of human cognitive capabilities to fulfill four classes of CPS tasks in Fig. 3.2. For all of its advantages, the active presence of human cognition also brings vulnerabilities. Compared to computer programs and robots that strictly follow the algorithms and retain the same level of performance, human operators may violate security procedures or be prone to errors due to misaligned incentives, herding effects, inattention, fatigue, and bounded rationality. In Chap. 4, we classify cognitive vulnerabilities into innate vulnerabilities in Sect. 4.1 and acquired vulnerabilities in Sect. 4.2 based on whether they can be mitigated through short-term external interference, including security training and mechanism design in Fig. 1.8. For each cognitive vulnerability, we first illustrate its impact on HCPSs and how cognitive attacks can exploit it. Then, we present system-scientific perspectives to characterize the vulnerability, the attacks, and the defense methods in different security scenarios, which focus on the computational aspects of vulnerability analysis, exploitation, and mitigation in the literature.

Original languageEnglish (US)
Title of host publicationSpringerBriefs in Computer Science
PublisherSpringer
Pages49-65
Number of pages17
DOIs
StatePublished - 2023

Publication series

NameSpringerBriefs in Computer Science
VolumePart F267
ISSN (Print)2191-5768
ISSN (Electronic)2191-5776

Keywords

  • Acquired vulnerability
  • Active learning
  • Bounded rationality
  • Inattentional blindness
  • Incompliance
  • Innate vulnerability
  • Misaligned incentive
  • Rational inattention
  • Security awareness

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities'. Together they form a unique fingerprint.

Cite this