Upgrade to Pro — share decks privately, control downloads, hide ads and more …

LLM SATs FTW

LLM SATs FTW

AI has been set to revolutionize every aspect of cybersecurity in the next 6 months... for the last 3 years. Cyber Threat Intelligence is supposed to be the exact kind of high intensity knowledge work where LLMs were supposed to make human analysts obsolete. We will look at where AI systems can and can't support analysts, rather than replace them, by making the exact techniques analysts should do, but often can't, possible.

Avatar for Scott J. Roberts

Scott J. Roberts

May 14, 2025
Tweet

More Decks by Scott J. Roberts

Other Decks in Technology

Transcript

  1. LLM SATs FTW Augmenting Analyst Decision Making with AI driven

    Structured Analytic Techniques Scott J Roberts - SANS Emerging Threat Summit 2025
  2. Scott J Roberts Instructor of Cyber Security @ Utah State

    University Founder @ Taurus.blue Author of Intelligence Driven Incident Response with Rebeakh Brown Former SANS 578 Instructor
  3. "Structured analysis is a mechanism by which internal thought processes

    are externalized in a systemic and transparent manner so that they can be shared, built on, and easily critiqued by others." ~ Structured Analytic Techniques for Intelligence Analysis by Heuer & Pherson
  4. The Problem SATs are hard to learn, hard to use,

    hard to teach, work best in teams, and take too long to execute effectively.
  5. SAT: Starbursting "Starbursting is a brainstorming technique that focuses on

    generating questions rather than eliciting ideas or answers. It uses the six questions commonly asked by journalists: Who? What? How? When? Where? and Why?" ~ Structured Analytic Techniques for Intelligence Analysis by Heuer & Pherson
  6. Starbursting Built a Streamlit app to run the Starbursting SAT

    Zero shot based on the SAT Given a scenario, generate questions for who, what, when, where, why, and how Output a JSON file with the results for human review Test Case: A ransomware attack on a hospital
  7. { "topic": "A ransomware attack on a hospital", "answer_who": [

    "Who carried out the ransomware attack on the hospital?", "Who was affected by the ransomware attack on the hospital?", "Who responded to the ransomware attack on the hospital?" ], "answer_what": [ "What was the impact of the ransomware attack on the hospital?", "What measures were taken to mitigate the ransomware attack on the hospital?", "What was the ransom demand in the ransomware attack on the hospital?" ], "answer_when": [ "When did the ransomware attack on the hospital occur?", "When was the ransomware attack on the hospital discovered?", "When was the ransomware attack on the hospital resolved?" ], "answer_where": [ "Where did the ransomware attack on the hospital originate from?", "Where were the hospital's systems affected by the ransomware attack?", "Where was the response to the ransomware attack coordinated from?" ], "answer_why": [ "Why was the hospital targeted in the ransomware attack?", "Why was the ransomware attack on the hospital successful?", "Why did the ransomware attack on the hospital cause the damage it did?"
  8. SAT: Analysis of Competing Hypotheses (ACH) "Analysis of Competing Hypotheses

    (ACH) is an analytic process that identifies a complete set of alternative hypotheses, systematically evaluates data that are consistent or inconsistent with each hypothesis, and proceeds by rejecting hypotheses rather than trying to confirm what appears to be the most likely hypotheses." ~ Structured Analytic Techniques for Intelligence Analysis by Heuer & Pherson
  9. Analysis of Competing Hypotheses Built a Streamlit app to run

    the ACH SAT Multi stage process based on the SAT Accepts a complex question First API Call: Generate a list of hypotheses Second Set of API Calls: Generate a list of evidence for/against each hypothesis Third Set of API Calls: Score each hypothesis based on the evidence Output a CSV file with the results for human review Test Case: Who was behind the XZ backdoor?
  10. SAT: Key Assumptions Check "The Key Assumptions Check is a

    systematic effort to make explit and question the assumptions (the mental model) that guide an analysts interpretation of evidence and reasoning about any particular problem." ~ Structured Analytic Techniques for Intelligence Analysis by Heuer & Pherson
  11. Key Assumptions Check Built a Streamlit app to run the

    Key Assumptions Check SAT Accepts a PDF file, extracts text Zero-shot classification of the text Generates a list of key assumptions Test Case: Strider Technologies - Inside the Shadow Network The report is about North Korean IT workers and their involvement in cybercrime
  12. Key Assumptions Check The document assumes that IT workers are

    involved in the manipulation of cryptocurrency markets, including the use of malware to mine cryptocurrencies. The document assumes that North Korean IT workers are dispatched abroad to countries like the PRC, Russia, Southeast Asia, Africa, and the Middle East. The document assumes that North Korean IT workers are involved in cybercrime activities such as hacking, ransomware deployment, and intellectual property theft. The document assumes that North Korean IT workers are using false identities and front companies to infiltrate Western businesses. The document assumes that PRC-based entities are involved in shipping equipment for DPRK remote workers. The document assumes that PRC-based front companies are facilitating the global operations of fraudulent North Korean IT workers. […]
  13. Jevon’s Paradox "The Jevons Paradox is when making something work

    better actually leads to using more of it, not less." ~PhilosophyTerms.com: Jevons Paradox Technological Advancement Further Demand for Resources Cost or Price Reduction Increased Consumption Economic Growth
  14. Take Aways LLMs are not a replacement for Analysts Let

    computers do computer things, let humans do human things, and figure out they work together Experimentation is always better than theory An AI system doesn’t have to be better than a human, just better than the best available human