Technical Program
Day 1 (November 5) | ||
---|---|---|
Time | Activities | Comments |
08:00 - 9:00 | Registration | |
09:00 - 9:10 | Welcoming Remarks | |
09:10 - 10:30 | Technical Session 1 | Multi-steps Attacks |
10:30 - 11:00 | Coffee Break | |
11:00 - 12:00 | Research Keynote | Cormac Herley, Microsoft Research |
12:00 - 13:30 | Lunch | |
13:30 - 14:30 | Technical Session 2 | Secret Communications |
14:30 - 15:30 | Poster Session (with coffee) | |
15:30 - 17:00 | Technical Session 3 | Identification of Attackers |
Guided Walking Tour | ||
20:00 - | Social Event | Program-chairs' Remarks |
Day 2 (November 6) | ||
---|---|---|
Time | Activities | Comments |
08:30 - 9:20 | Registration | |
09:20 - 10:30 | Technical Session 4 | Network Security |
10:30 - 11:00 | Coffee Break | |
11:00 - 12:00 | Industry Keynote | Costin G. Raiu, Kaspersky Lab |
12:00 - 13:30 | Lunch | |
13:30 - 15:00 | Technical Session 5 | System Defence |
15:00 - 15:30 | Coffee Break | |
15:30 - 16:40 | Technical Session 6 | Applications Security |
16:40 - 17:00 | Closing Remarks |
*The time slot for full paper presentation will be 25 min + 5 min discussion, and for short paper will be 15 min + 5 min discussion.
Day 1 (November 5)
Multi-step attacks | |||
---|---|---|---|
9:10 - 10:30 | Ahto Buldas and Roman Stepanenko Upper Bounds for Adversaries' Utility in Attack Trees |
||
Jingqiang Lin, Peng Liu, and Jiwu Jing Using Signaling Games to Model the Multi-step Attack-defense Scenarios on Confidentiality |
|||
Alan Nochenson and C.F. Larry Heimann Simulation and Game-Theoretic Analysis of an Attacker-Defender Game |
Secret Communications | |||
---|---|---|---|
13:30 - 14:30 | Benjamin Johnson, Pascal Schottle, Rainer Bohme Where to Hide the Bits ? |
||
Mehrdad Nojoumian and Douglas R. Stinson Socio-Rational Secret Sharing as a New Direction in Rational Cryptography |
Poster Session | |||
---|---|---|---|
14:30 - 15:30 |
Jeremiah Blocki, Manuel Blum, Anupam Datta
Guessing Games: Evaluating the Security of a Password Management Scheme |
||
Harkeerat Bedi, Sajjan Shiva, Chris Simmons, Vivek Shandilya
A Game Inspired Defense Architecture |
|||
Francesco Ciardiello, Jane Binner, Vincent Schmidt
Towards a Resilience Index for Social Networks Under Evacuation |
|||
Kien Nguyen, Hamidou Tembine, Tansu Alpcan, Tamer Basar
Nonzero-Sum Stochastic Games for Security in Networks with Interdependent Nodes |
|||
Kalliopi Anastasopoulou, Theo Tryfonas, Spyros Kokolakis
Analysis of strategic stakeholder interactions in cloud-based mobile app use by privacy-sensitive end users |
|||
Kohei Sugiyama, Takeshi Kubo, Lingjie Duan, Atsushi Tagami, Teruyuki Hasegawa, Jianwei Huang
Incentive Mechanisms for Secure Smartphone Collaboration |
|||
Christos Dimitrakakis, Aikaterini Mitrokotsa
Near-Optimal Node Blacklisting in Adversarial Networks |
|||
Krzysztof Szajowski
On some Distributed Disorder Detection |
Identification of Attackers | |||
---|---|---|---|
15:30 - 17:00 | Jeremiah Blocki, Nicolas Christin, Anupam Datta, and Arunesh
Sinha Audit Mechanisms for Provable Risk Management and Accountable Data Governance |
||
SingRu (Celine) Hoe, Murat Kantarcioglu, and Alain Bensoussan
A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets |
|||
Lemonia Dritsoula, Patrick Loiseau, and John Musacchio Computing the Nash Equilibria of Intruder Classification Games |
Day 2 (November 6)
Network Security | |||
---|---|---|---|
9:20 - 10:30 | �ron L�szka, D�vid Szeszl�r, and Levente Butty�n
Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality |
||
Andrew Clark, Quanyan Zhu, Radha Poovendran, and Tamer Basar Deceptive Routing in Relay Networks |
|||
Assane Gueye and Vladimir Marbukh
A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation |
System Defense | |||
---|---|---|---|
13:30 - 15:00 | Radek P�bil, Viliam Lisy, Christopher Kiekintveld, Branislav
Bosansky, and Michal Pechoucek
Game Theoretic Model of Strategic Honeypot Selection in Computer Networks |
||
M. Patrick Collins
A Cost-Based Mechanism for Evaluating The Effectiveness of Moving Target Defenses |
|||
Viet Pham and Carlos Cid
Are We Compromised? Modelling Security Assessment Games |
|||
Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels,
Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos
Defending Against the Unknown Enemy: Applying FlipIt to System Security |
Applications Security | |||
---|---|---|---|
15:30-16:40 | Saurabh Amin, Galina A. Schwartz, and Hamidou Tembine
Incentives and Security in Electricity Distribution Networks |
||
Yee Wei Law, Tansu Alpcan, Marimuthu Palaniswami, and
Subhrakanti Dey
Security Games and Risk Minimization for Automatic Generation Control in Smart Grid |
|||
Robert Nix and Murat Kantarcioglu Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing |
Social Program
GameSec 2012 social program aims to bring researchers working on similar topics together and grow our community. The social program consists of
- Guided walking tour of downtown Budapest: The tour will be on Monday November 5th afternoon from 17:30-20:00. The departure is from the Marriott hotel, and will end at the dinner place, the Columbus ship. During the tour the conference participants will be guided to the most interesting places in the downtown of Budapest.
- Conference dinner will be on Monday November 5th evening from 20:00-23:00 in the elegant restaurant Columbus that is in a ship standing on the river Danube with beautiful view to the city.
Plenary Program
GameSec 2012 includes plenary talks by two researchers, Cormac Herley (Microsoft Research) and Costin G. Raiu (Kaspersky Lab).
-
Title: FFF: Flame&Family Friends
Plenary Speaker: Costin G. Raiu (Kaspersky Lab)
Download Abstract -
Title: Security and Scale
Plenary Speaker: Cormac Herley (Microsoft Research)
Download Abstract