Technical Program
The conference program will include 2 keynotes, 2 panels, a tutorial, and presentations of accepted papers.
The accepted papers will be available here for download throughout the conference duration.
Program At a Glance
| Wed 30th Oct | Thu 31st Oct | Fri 1st Nov | |
|---|---|---|---|
| 8:30am-9am | Registration and Opening Remarks | ||
| 9am-10am | Keynote: Prof. Mingyan Liu (U. Michigan) (Slides) |
Keynote: Dr. Reza Ghanadan (Google AI) | Session 5 Information Security |
| 10am-10:40am | Session 1 CPS Security |
Session 3 Security Games |
|
| 10:40am-11:30am | Interactive 5 with Coffee | ||
| 11:30am-12:30pm | Interactive 1 with Coffee | Interactive 3 with Coffee | Tutorial on Adversarial ML |
| 12:30pm-1:30pm | Lunch | Lunch | Lunch |
| 1:30pm-3:00pm | Session 2 Adversarial AI |
Session 4 Threats and Deception |
Session 6 Risk, insurance, & policy |
| 3:00pm-4:00pm | Interactive 2 with Coffee | Interactive 4 with Coffee | Interactive 6 with Coffee |
| 4:00pm-5:00pm | Industry Panel | Panel: Computing and Games - A look to the future | Closing remarks |
| 7:00pm-9pm | Welcome reception | Banquet dinner |
Full Program
The full program can be found here.
Full Papers
-
Playing Adaptively Against Stealthy Opponents: A Reinforcement Learning Strategy for the FlipIt Security Game
Lisa Oakley and Alina Oprea
-
When Players Affect Target Values: Modeling and Solving Dynamic Partially Observable Security Games
Xinrun Wang, Milind Tambe, Branislav Bosansky and Bo An
-
On the Optimality of Linear Signaling to Deceive Kalman Filters Over Finite/Infinite Horizons
Muhammed Sayin and Tamer Basar
-
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach
Kavita Kumari, Murtuza Jadliwala, Anindya Maiti and Hossein Manshaei
-
Cyber Camouflage Games for Strategic Deception
Omkar Thakoor, Milind Tambe, Phebe Vayanos, Haifeng Xu, Christopher Kiekintveild and Fei Feng
-
Adaptive Honeypot Engagement through ReinforcementLearning of Semi-Markov Decision Processes
Linan Huang and Quanyan Zhu
-
DeepFP for Finding Nash Equilibrium in Continuous Action Spaces
Nitin Kamra, Umang Gupta, Kai Wang, Fei Fang, Yan Liu and Milind Tambe
-
Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals
Yunhan Huang and Quanyan Zhu
-
Tackling Sequential Attacks in Security Games
Thanh Nguyen, Amulya Yadav, Branislav Bosansky and Yu Liang
-
Discussion of Fairness and Implementability in Stackelberg Security Games
Víctor Bucarey and Martine Labbé
-
Solving Cyber Alert Allocation Markov Games With Deep Reinforcement Learning
Noah Dunstatter, Alireza Tahsini, Mina Guirguis and Jelena Tesic
-
You Only Lie Twice: A Multi-Round Cyber Deception Game of Questionable Veracity
Mark Bilinski, Ryan Gabrys, Justin Mauger, Kimberly Ferguson-Walter, Sunny Fugate and Brian Souza
-
Linear Temporal Logic Satisfaction in Adversarial Environments using Secure Control Barrier Certificates
Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell and Radha Poovendran
-
Toward a Theory of Vulnerability Disclosure Policy: A Hacker's Game
Taylor Canann
-
General Sum Markov Games for Strategic Detection of Advanced Persistent Threats using Moving Target Defense in Cloud Networks
Sailik Sengupta, Ankur Chowdhary, Dijiang Huang and Subbarao Kambhampati
-
Effective Premium Discrimination for Designing Cyber Insurance Policies with Rare Losses
Mohammad Mahdi Khalili, Xueru Zhang and Mingyan Liu
-
Design of Load Forecast Systems Resilient Against Cyber-Attacks
Carlos Barreto and Xenofon Koutsoukos
-
Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach
Serkan Sarıtaş, Ezzeldin Shereen, Henrik Sandberg and György Dán
-
When is a Semi-Honest Secure Multiparty Computation Valuable?
Radhika Bhargava and Chris Clifton
-
Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning
Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee and Radha Poovendran
-
Perfectly Secure Message Transmission against Independent Rational Adversaries
Kenji Yasunaga and Takeshi Koshiba
-
Time-Dependent Strategies in Games of Timing
Jonathan Merlevede, Benjamin Johnson, Jens Grossklags and Tom Holvoet
Short Papers
-
Power Law Public Goods Game for Personal Information Sharing in News Commentaries
Christopher Griffin, Sarah Rajtmajer, Prasanna Umar and Anna Squicciarini
-
Realistic versus Rational Secret Sharing
Yvo Desmedt and Arkadii Slinko
-
Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception
Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H Anwar and Christopher Kiekintveld
-
Investing in prevention or paying for recovery - attitudes to cyber risk
Anna Cartwright, Edward Cartwright and Lian Xue
-
How to Merge Two Secret Sharing Schemes
Arkadii Slinko
-
MTDeep: Moving Target Defense to Boost the Security of Deep Neural Nets Against Adversarial Attacks
Sailik Sengupta, Tathagata Chakraborti and Subbarao Kambhampati
-
Honeypot Type Selection Games for Smart Grid Networks
Nadia Boumkheld, Sakshyam Panda, Stefan Rass and Emmanouil Panaousis
-
Choosing Protection: User Investments in Security Measures for Cyber Risk Management
Yoav Ben Yaakov, Xinrun Wang, Joachim Meyer and Bo An
-
A Framework for Joint Attack Detection and Control Under False Data Injection
Luyao Niu and Andrew Clark
-
Dynamic Cheap Talk for Robust Adversarial Learning
Zuxing Li and György Dán
-
Cut-The-Rope: A Game of Stealthy Intrusion
Stefan Rass, Sandra König and Emmanouil Panaousis
GameSec 2019 Proceedings
GameSec 2019 proceedings are published by Springer as part of the LNCS series.
During the conference, the proceedings will be available free of charge online.