Technical Program
| Day 1 (November 6) | |
|---|---|
| Time | Activities |
| 08:00 - 08:50 | Breakfast & Registration |
| 08:55 - 09:00 | Opening Remarks |
| 09:00 - 10:30 | Behavioral Models for Security |
| 10:30 - 11:00 | Break |
| 11:00 - 12:00 | Plenary Speaker: Professor Bud Mishra |
| 12:00 - 13:30 | Lunch |
| 13:30 - 15:00 | Network Security |
| 15:00 - 16:00 | Poster Session |
| 16:00 - 17:00 | Data Integrity and Security |
| Day 2 (November 7) | ||
|---|---|---|
| Time | Activities | |
| 08:15 - 08:55 | Breakfast & Registration | |
| 09:00 - 10:30 | Security and Economics | |
| 10:30 - 11:00 | Break | |
| 11:00 - 12:00 | Plenary Speaker: Professor Shankar Sastry | |
| 12:00 - 13:30 | Lunch | |
| 13:30 - 15:00 | Decision and Control for Cybersecurity | |
| 15:00 - 15:30 | Break | |
| 15:30 - 16:30 | Security of Competitive Environments | |
| 16:30 - 16:40 | Closing Remarks | |
Day 1 (November 6)
| 08:00 - 08:50 Breakfast & Registration |
|---|
| 08:55 - 09:00 Opening Remarks |
|---|
| 09:00 - 10:30 Behavioral Models for Security [chair: Mohammad Rasouli] |
|---|
| Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms Chao Zhang, Albert Xin Jiang, Martin Short, Jeffrey Brantingham and Milind Tambe |
| Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries Matthew Brown, William Haskell and Milind Tambe |
| Numerical Computation of Multi-Goal Security Strategies Stefan Rass and Benjamin Rainer |
| 10:30 - 11:00 Coffee break |
|---|
| 11:00 - 12:00 Plenary Speaker: Professor Bud Mishra [chair: Quanyan Zhu] |
|---|
| Enigma of Arrival: Codes, Codons and Coding Download. |
| 12:00 - 13:30 Lunch |
|---|
| 13:30 - 15:00 Network Security [chair: Galina Schwartz] |
|---|
| Secure Message Delivery Games for Device-to-Device Communications Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni and Mauro Conti |
| Toward Optimal Network Topology Design for Fast and Secure Distributed Computation Ji Liu and Tamer Basar |
| Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report) Michael Wellman and Achintya Prakash |
| 15:00 - 16:00 Poster Session [chair: Emmanouil Panaousis] |
|---|
| Adversary Modeling in Stackelberg Security Games Jinshu Cui and Richard John |
| A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design Sadegh Farhang, Mohammad Hossein Manshaei, Milad Nasr Esfahani and Quanyan Zhu |
| Can Less Be More? A Game-Theoretical Analysis of Investment vs. Filtering Armin Sarabi, Parinaz Naghizadeh and Mingyan Liu |
| Online Learning Methods for Border Patrol Resource Allocation Richard Klima, Christopher Kiekintveld and Viliam Lisy |
| A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods Jianhua Zhang, Prateek Jaipuria, Aranya Chakrabortty and Alefiya Hussain |
| Testing for Hardware Trojans: A Game-Theoretic Approach Charles Kamhoua, Manuel Rodriguez and Kevin Kwiat |
| Surveillance for Security as a Pursuit-Evasion Game Sourabh Bhattacharya, Tamer Basar and Maurizio Falcone |
| 16:00 - 17:00 Data Integrity and Security [chair: Aranya Chakrabortty] |
|---|
| Data Integrity and Availability Verification Game in Untrusted Cloud Storage Brahim Djebaili, Christophe Kiennert, Jean Leneutre and Lin Chen |
| Realizable Rational Multiparty Cryptographic Protocols John Ross Wallrabenstein and Chris Clifton |
Day 2 (November 7)
| 08:15 - 08:55 Breakfast & Registration |
|---|
| 09:00 - 10:30 Security and Economics [chair: Galina Schwartz] |
|---|
| Limiting Adversarial Budget in Quantitative Security Assessment Aleksandr Lenin and Ahto Buldas |
| An Economic Model of App Adoption Decisions on Networks with Interdependent Privacy Consequences Yu Pu and Jens Grossklags |
| Optimal Contracts for Outsourced Computation Viet Pham, Mhr Khouzani and Carlos Cid |
| 10:30 - 11:00 Coffee break |
|---|
| 11:00 - 12:00 Plenary Speaker: Professor Shankar Sastry [chair: Radha Poovendran] |
|---|
| Big Data Meets CPS Download. |
| 12:00 - 13:30 Lunch |
|---|
| 13:30 - 15:00 Decision and Control for Cybersecurity [chair: Michael Wellman] |
|---|
| Cybersecurity Games and Investments: A Decision Support Approach Emmanouil Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin and Fabrizio Smeraldi |
| A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adver Abhishek Gupta, Tamer Basar and Galina Schwartz |
| A Supervisory Control Approach to Dynamic Cyber-Security Mohammad Rasouli, Erik Miehling and Demosthenis Teneketzis |
| 15:00 - 15:30 Coffee break |
|---|
| 15:30 - 16:30 Security of Competitive Environments [chair: Manos Panaousis] |
|---|
| FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources Aron Laszka, Gabor Horvath, Mark Felegyhazi and Levente Buttyan |
| Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments MHR Khouzani, Viet Pham and Carlos Cid |
| 16:30 - 16:40 Closing Remarks |
|---|