GameSec 2012

Conference on Decision and Game Theory for Security

November 5-6, 2012, Budapest, Hungary

Technical Program

Time Table
Day 1 (November 5)
Time Activities Comments
08:00 - 9:00 Registration
09:00 - 9:10 Welcoming Remarks
09:10 - 10:30 Technical Session 1 Multi-steps Attacks
10:30 - 11:00 Coffee Break
11:00 - 12:00 Research Keynote Cormac Herley, Microsoft Research
12:00 - 13:30 Lunch
13:30 - 14:30 Technical Session 2 Secret Communications
14:30 - 15:30 Poster Session (with coffee)
15:30 - 17:00 Technical Session 3 Identification of Attackers
Guided Walking Tour
20:00 - Social Event Program-chairs' Remarks



Day 2 (November 6)
Time Activities Comments
08:30 - 9:20 Registration
09:20 - 10:30 Technical Session 4 Network Security
10:30 - 11:00 Coffee Break
11:00 - 12:00 Industry Keynote Costin G. Raiu, Kaspersky Lab
12:00 - 13:30 Lunch
13:30 - 15:00 Technical Session 5 System Defence
15:00 - 15:30 Coffee Break
15:30 - 16:40 Technical Session 6 Applications Security
16:40 - 17:00 Closing Remarks

*The time slot for full paper presentation will be 25 min + 5 min discussion, and for short paper will be 15 min + 5 min discussion.

Day 1 (November 5)

Multi-step attacks
9:10 - 10:30Ahto Buldas and Roman Stepanenko
Upper Bounds for Adversaries' Utility in Attack Trees
Jingqiang Lin, Peng Liu, and Jiwu Jing
Using Signaling Games to Model the Multi-step Attack-defense Scenarios on Confidentiality
Alan Nochenson and C.F. Larry Heimann
Simulation and Game-Theoretic Analysis of an Attacker-Defender Game

Secret Communications
13:30 - 14:30Benjamin Johnson, Pascal Schottle, Rainer Bohme
Where to Hide the Bits ?
Mehrdad Nojoumian and Douglas R. Stinson
Socio-Rational Secret Sharing as a New Direction in Rational Cryptography

Poster Session
14:30 - 15:30 Jeremiah Blocki, Manuel Blum, Anupam Datta
Guessing Games: Evaluating the Security of a Password Management Scheme
Harkeerat Bedi, Sajjan Shiva, Chris Simmons, Vivek Shandilya
A Game Inspired Defense Architecture
Francesco Ciardiello, Jane Binner, Vincent Schmidt
Towards a Resilience Index for Social Networks Under Evacuation
Kien Nguyen, Hamidou Tembine, Tansu Alpcan, Tamer Basar
Nonzero-Sum Stochastic Games for Security in Networks with Interdependent Nodes
Kalliopi Anastasopoulou, Theo Tryfonas, Spyros Kokolakis
Analysis of strategic stakeholder interactions in cloud-based mobile app use by privacy-sensitive end users
Kohei Sugiyama, Takeshi Kubo, Lingjie Duan, Atsushi Tagami, Teruyuki Hasegawa, Jianwei Huang
Incentive Mechanisms for Secure Smartphone Collaboration
Christos Dimitrakakis, Aikaterini Mitrokotsa
Near-Optimal Node Blacklisting in Adversarial Networks
Krzysztof Szajowski
On some Distributed Disorder Detection

Identification of Attackers
15:30 - 17:00Jeremiah Blocki, Nicolas Christin, Anupam Datta, and Arunesh Sinha
Audit Mechanisms for Provable Risk Management and Accountable Data Governance
SingRu (Celine) Hoe, Murat Kantarcioglu, and Alain Bensoussan
A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets
Lemonia Dritsoula, Patrick Loiseau, and John Musacchio
Computing the Nash Equilibria of Intruder Classification Games

Day 2 (November 6)

Network Security
9:20 - 10:30�ron L�szka, D�vid Szeszl�r, and Levente Butty�n
Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality
Andrew Clark, Quanyan Zhu, Radha Poovendran, and Tamer Basar
Deceptive Routing in Relay Networks
Assane Gueye and Vladimir Marbukh
A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation

System Defense
13:30 - 15:00Radek P�bil, Viliam Lisy, Christopher Kiekintveld, Branislav Bosansky, and Michal Pechoucek
Game Theoretic Model of Strategic Honeypot Selection in Computer Networks
M. Patrick Collins
A Cost-Based Mechanism for Evaluating The Effectiveness of Moving Target Defenses
Viet Pham and Carlos Cid
Are We Compromised? Modelling Security Assessment Games
Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos
Defending Against the Unknown Enemy: Applying FlipIt to System Security

Applications Security
15:30-16:40Saurabh Amin, Galina A. Schwartz, and Hamidou Tembine
Incentives and Security in Electricity Distribution Networks
Yee Wei Law, Tansu Alpcan, Marimuthu Palaniswami, and Subhrakanti Dey
Security Games and Risk Minimization for Automatic Generation Control in Smart Grid
Robert Nix and Murat Kantarcioglu
Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing

Social Program

GameSec 2012 social program aims to bring researchers working on similar topics together and grow our community. The social program consists of

  • Guided walking tour of downtown Budapest: The tour will be on Monday November 5th afternoon from 17:30-20:00. The departure is from the Marriott hotel, and will end at the dinner place, the Columbus ship. During the tour the conference participants will be guided to the most interesting places in the downtown of Budapest.
  • Conference dinner will be on Monday November 5th evening from 20:00-23:00 in the elegant restaurant Columbus that is in a ship standing on the river Danube with beautiful view to the city.

Plenary Program

GameSec 2012 includes plenary talks by two researchers, Cormac Herley (Microsoft Research) and Costin G. Raiu (Kaspersky Lab).