GameSec 2014

Conference on Decision and Game Theory for Security

November 6-7, 2014, Los Angeles, CA, USA

2014 Conference on Decision and Game Theory for Security

GameSec 2014, the fifth Conference on Decision and Game Theory for Security will take place in Los Angeles, CA, USA on November 6-7, 2014.

News

  • 2014-10-09: Technical program is available.
  • 2014-10-06: Financial Support application deadline has been extended (under SUPPORT page)!
  • 2014-10-05: Visa Guidelines are available under TRAVEL Page.
  • Hotel Information is available under TRAVEL page!
  • Notification date has been extended to Aug 19, 2014.
  • Submission deadline has been extended to 23:59 EST June 30, 2014 (Firm)!
  • Submission deadline has been extended to June 16, 2014!
  • Submission page is now available - https://www.easychair.org/conferences/?conf=gamesec14
  • Call for Papers is now available - [PDF]

Plenary Speakers

Day 1

Photo: Professor Bud Mishra
Professor
Bud Mishra
Bud Mishra is a professor of computer science and mathematics at NYU’s Courant Institute of Mathematical Sciences, professor of human genetics at Mt. Sinai School of Medicine, and a professor of cell biology at NYU School of Medicine. He currently leads several groups working in biotechnology, bioinformatics, biomedicine, cyber security, data privacy, and data sciences. He is a fellow of IEEE, ACM and AAAS, a Distinguished Alumnus of IIT-Kgp, and a NYSTAR Distinguished Professor. From 2001-04, he was a professor at the Watson School of Biological Sciences, Cold Spring Harbor Lab; currently he is a QB visiting scholar at Cold Spring Harbor Lab. More information, including papers and presentation decks, is available on his web site, http://cs.nyu.edu/mishra/.

Enigma of Arrival: Codes, Codons and Coding

Abstract: Information-asymmetric games have been used to model evolutionary biology (codon evolution, multi-cellularity and cancer), computing (machine learning and data science), and the Internet (cyber security and insider threat). Interestingly, the opportunities for “deceptions” in such games are rampant, since the agents in such a game can adopt a signaling convention (separating equilibrium) that is suboptimal in terms of information transfer, but that is stable nonetheless. To address analogous problems in the cyber physical contexts, we use scenarios from biology to motivate and engineer various mechanisms for security, privacy and trust – for instance, by examining the evolution of the genetic code, which is nearly optimal in terms of information transfer, but is also universal and nearly immutable. Finally, we discuss a resulting design of a cyber security system and examine it at length via large-scale simulations.

Day 2

Photo: Professor S. Shankar Sastry
Professor
S. Shankar Sastry
S. Shankar Sastry is currently the Dean of Enginnering at University of California, Berkeley and the faculty director of the Blum Center for Developing Economies. From 2004 to 2007 he was the Director of CITRIS (Center for Information Technology in the Interests of Society) an interdisciplinary center spanning UC Berkeley, Davis, Merced and Santa Cruz. He has served as Chairman, Department of Electrical Engineering and Computer Sciences, University of California, Berkeley from January, 2001 through June 2004. From 1999 – early 2001, he was on leave from Berkeley as Director of the Information Technology Office at the Defense Advanced Research Projects Agency (DARPA). From 1996 – 1999, he was the Director of the Electronics Research Laboratory at Berkeley. More information, including papers and presentation decks, is available on his web site, http://robotics.eecs.berkeley.edu/~sastry/.

Coming soon.

Description

Recent advances in networking, communications, computation, software, and hardware technologies have revolutionized the information technology landscape. Indeed, this cyberspace has become an integral part of every person's daily life and the way we conduct business. Protecting the sensitive content of every nation's cyberspace infrastructure has thus become critical to ensure economic growth, prosperity, and advancement. However, the heterogeneous, dynamic, and large-scale nature of modern- day networked and information technology infrastructure warrants novel analytical and practical approaches for securing its assets and maintaining its trustworthiness.

Owing to its powerful analytical and modeling frameworks, game theory has recently emerged as a key tool for building resilient, secure, and dependable networked systems. Coupled with synergistic techniques such as dynamic control, mechanism design, and economics, game theory is expected to constitute the heart of a much needed science of security. The goal of the GameSec conference to gather original contributions that present theoretical and practical contributions that will build the knowledgebase in the science of security, in general, and game-theoretic security, in particular.

Conference Topics

The goal of this conference is to bring together academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connection between game theory, control, distributed optimization, economic incentives and real world security, reputation, trust and privacy problems in a variety of technological systems. Topics of interest include but are not limited to the following:

  • Game-theory and mechanism design for security
  • Pricing and economic incentives for building dependable and secure systems.
  • Dynamic control, learning, and optimization approaches.
  • Game theory for privacy in the context of applications and user data.
  • Decision making and decision theory for cybersecurity.
  • Security of wireless and communication networks.
  • Novel algorithms, protocols, and approximation techniques.
  • Socio-technological and behavioral approaches to security.
  • Risk assessment and risk management.
  • Emerging paradigms such as cyberphysical security and moving target defence.
  • New approaches for resilient control systems.
  • Applications areas: smart grid, wireless networks, computer networks, and cloud.
  • Empirical and experimental economic analyses and simulation studies

Conference Sponsors

We thank all our sponsors for their kind support.

  • Conference Partner
  • National Science Foundation (NSF)
NSF logo