GameSec 2011

Conference on Decision and Game Theory for Security

November 14-15, 2011, College Park, Maryland, USA

Presentation Slides

Welcoming Remark

  • Introduction to the University of Maryland Cybersecurity Center (MC2)[Slides]
    Michael Hicks (University of Maryland, College Park, MD, USA)

Plenary Keynote 1

  • Beyond Nash Equilibrium: Solution Concepts for the 21st Century [Slides]
    Joe Halpern (Cornell University, NY, USA)

Session 1: Attacks, Adversaries and Game Theory

  • Indices of Power in Optimal IDS Default Conguration: Theory and Examples [Slides]
    Quanyan Zhu (UIUC, IL, USA) and
    Tamer Basar (UIUC, IL, USA)

  • Exploiting Adversary's Risk Profiles in Imperfect Information Security Games [Slides]
    Gabriel Stocco (Dartmouth College, NH, USA) and
    George Cybenko (Dartmouth College, NH, USA)

Session 2: Wireless Adhoc and Sensor Networks

  • An Anti-Jamming Strategy for Channel Access in Cognitive Radio Networks [Slides]
    Shabnam Sodagari (Virginia Tech, VA, USA) and
    Charles Clancy (Virginia Tech, VA, USA)

  • Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks [Slides]
    Tamara Bonaci (University of Washington, Seattle, WA, USA) and
    Linda Bushnell (University of Washington, Seattle, WA, USA)

  • Multi-variate Quickest Detection of Significant Change Process [Slides]
    Krzysztof Szajowski (Wroclaw University of Technology, Poland)

Session 3: Network Games

  • Interplay between security providers, consumers, and attackers: a weighted congestion game approach [Slides]
    Patrick Maille (Telecom Bretagne, France),
    Peter Reichl (Telecommunications Research Center Vienna, Austria) and
    Bruno Tuffin (INRIA, France)

  • Network Games with and without Synchroneity [Slides]
    Ahmad Termimi Ab Ghani (Tohoku University, Japan) and
    Kazuyuki Tanaka (Tohoku University, Japan)

  • An asymptotic solution of Dresher's guessing game [Slides]
    Robbert Fokkink (Delft University of Technology, Netherlands) and
    Misha Stassen (Delft University of Technology, Netherlands)

Plenary Keynote 2

  • Cybersecurity -- How did we get here and where are we going? [Slides]
    Carl Landwehr (National Science Foundation, USA)

Plenary Keynote 3

  • Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements [Slides]
    Nicolas Christin (Carnegie Mellon University, PA, USA)

Session 4: Security Insurance

  • Security Games with Market Insurance [Slides]
    Benjamin Johnson (University of California, Berkeley, CA, USA),
    Rainer Boehme (Muenster University, Germany) and
    Jens Grossklags (Pennsylvania State University, PA, USA)

  • Aegis: A Novel Cyber-Insurance Model [Slides]
    Ranjan Pal (University of Southern California, CA, USA),
    Leana Golubchik (University of Southern California, CA, USA) and
    Konstantinos Psounis (University of Southern California, CA, USA)

Session 5: Security and Trust in Social Networks

  • Maximizing Influence in Competitive Environments: A Game-Theoretic Apporach [Slides]
    Radha Poovendran (University of Washington, Seattle, WA, USA) and
    Andrew Clark (University of Washington, Seattle, WA, USA)

  • Collaborative Location Privacy with Rational Users [Slides]
    Francisco Santos (Ecole Polytechnique Federale de Lausanne, Switzerland),
    Mathias Humbert (Ecole Polytechnique Federale de Lausanne, Switzerland),
    Reza Shokri (Ecole Polytechnique Federale de Lausanne, Switzerland) and
    Jean-Pierre Hubaux (Ecole Polytechnique Federale de Lausanne, Switzerland)

  • Digital Trust Games: An Experimental Study [Slides]
    Tansu Alpcan (Technical University of Berlin, Germany),
    Albert Levi (Sabanci University, Turkey) and
    Erkay Savas (Sabanci University, Turkey)

  • Colonel Blotto in the Phishing War [Slides]
    Pern Hui Chia (Norwegian University of Science and Technology, Norway) and
    John Chuang (University of California, Berkeley, CA, USA)

Session 6: Security Investments

  • Investment in Privacy-Preserving Technologies under Uncertainty [Slides]
    Murat Kantarcioglu (University of Texas at Dallas, TX, USA),
    Alain Bensoussan (University of Texas at Dallas, TX, USA) and
    Celine Hoe (University of Texas at Dallas, TX, USA)

  • Modeling Internet Security Investments: Dealing With Topological Information Uncertainty [Slides]
    Ranjan Pal (University of Southern California, CA, USA) and
    Pan Hui (Deutsch Telekom, Germany)

GameSec 2012 Announcement

  • GameSec 2012 will be held on November 5-6, 2012 in Budapest, Hungary [Slides].