GameSec 2014

Conference on Decision and Game Theory for Security

November 6-7, 2014, Los Angeles, CA, USA

Technical Program

Time Table
Day 1 (November 6)
Time Activities
08:00 - 08:50 Breakfast & Registration
08:55 - 09:00 Opening Remarks
09:00 - 10:30 Behavioral Models for Security
10:30 - 11:00 Break
11:00 - 12:00 Plenary Speaker: Professor Bud Mishra
12:00 - 13:30 Lunch
13:30 - 15:00 Network Security
15:00 - 16:00 Poster Session
16:00 - 17:00 Data Integrity and Security

Day 2 (November 7)
Time Activities
08:15 - 08:55 Breakfast & Registration
09:00 - 10:30 Security and Economics
10:30 - 11:00 Break
11:00 - 12:00 Plenary Speaker: Professor Shankar Sastry
12:00 - 13:30 Lunch
13:30 - 15:00 Decision and Control for Cybersecurity
15:00 - 15:30 Break
15:30 - 16:30 Security of Competitive Environments
16:30 - 16:40 Closing Remarks

Day 1 (November 6)

08:00 - 08:50
Breakfast & Registration

08:55 - 09:00
Opening Remarks

09:00 - 10:30
Behavioral Models for Security
[chair: Mohammad Rasouli]
Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms
Chao Zhang, Albert Xin Jiang, Martin Short, Jeffrey Brantingham and Milind Tambe
Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries
Matthew Brown, William Haskell and Milind Tambe
Numerical Computation of Multi-Goal Security Strategies
Stefan Rass and Benjamin Rainer

10:30 - 11:00
Coffee break

11:00 - 12:00
Plenary Speaker: Professor Bud Mishra
[chair: Quanyan Zhu]
Enigma of Arrival: Codes, Codons and Coding
Download.

12:00 - 13:30
Lunch

13:30 - 15:00
Network Security
[chair: Galina Schwartz]
Secure Message Delivery Games for Device-to-Device Communications
Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni and Mauro Conti
Toward Optimal Network Topology Design for Fast and Secure Distributed Computation
Ji Liu and Tamer Basar
Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)
Michael Wellman and Achintya Prakash

15:00 - 16:00
Poster Session
[chair: Emmanouil Panaousis]
Adversary Modeling in Stackelberg Security Games
Jinshu Cui and Richard John
A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design
Sadegh Farhang, Mohammad Hossein Manshaei, Milad Nasr Esfahani and Quanyan Zhu
Can Less Be More? A Game-Theoretical Analysis of Investment vs. Filtering
Armin Sarabi, Parinaz Naghizadeh and Mingyan Liu
Online Learning Methods for Border Patrol Resource Allocation
Richard Klima, Christopher Kiekintveld and Viliam Lisy
A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods
Jianhua Zhang, Prateek Jaipuria, Aranya Chakrabortty and Alefiya Hussain
Testing for Hardware Trojans: A Game-Theoretic Approach
Charles Kamhoua, Manuel Rodriguez and Kevin Kwiat
Surveillance for Security as a Pursuit-Evasion Game
Sourabh Bhattacharya, Tamer Basar and Maurizio Falcone

16:00 - 17:00
Data Integrity and Security
[chair: Aranya Chakrabortty]
Data Integrity and Availability Verification Game in Untrusted Cloud Storage
Brahim Djebaili, Christophe Kiennert, Jean Leneutre and Lin Chen
Realizable Rational Multiparty Cryptographic Protocols
John Ross Wallrabenstein and Chris Clifton

Day 2 (November 7)

08:15 - 08:55
Breakfast & Registration

09:00 - 10:30
Security and Economics
[chair: Galina Schwartz]
Limiting Adversarial Budget in Quantitative Security Assessment
Aleksandr Lenin and Ahto Buldas
An Economic Model of App Adoption Decisions on Networks with Interdependent Privacy Consequences
Yu Pu and Jens Grossklags
Optimal Contracts for Outsourced Computation
Viet Pham, Mhr Khouzani and Carlos Cid

10:30 - 11:00
Coffee break

11:00 - 12:00
Plenary Speaker: Professor Shankar Sastry
[chair: Radha Poovendran]
Big Data Meets CPS
Download.

12:00 - 13:30
Lunch

13:30 - 15:00
Decision and Control for Cybersecurity
[chair: Michael Wellman]
Cybersecurity Games and Investments: A Decision Support Approach
Emmanouil Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin and Fabrizio Smeraldi
A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adver
Abhishek Gupta, Tamer Basar and Galina Schwartz
A Supervisory Control Approach to Dynamic Cyber-Security
Mohammad Rasouli, Erik Miehling and Demosthenis Teneketzis

15:00 - 15:30
Coffee break

15:30 - 16:30
Security of Competitive Environments
[chair: Manos Panaousis]
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources
Aron Laszka, Gabor Horvath, Mark Felegyhazi and Levente Buttyan
Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments
MHR Khouzani, Viet Pham and Carlos Cid

16:30 - 16:40
Closing Remarks