GameSec 2019

Conference on Decision and Game Theory for Security

October 30 - November 1, 2019, Stockholm, Sweden

Technical Program

The conference program will include 2 keynotes, 2 panels, a tutorial, and presentations of accepted papers.

The accepted papers will be available here for download throughout the conference duration.

Program At a Glance

Wed 30th Oct Thu 31st Oct Fri 1st Nov
8:30am-9am Registration and Opening Remarks
9am-10am Keynote: Prof. Mingyan Liu (U. Michigan)
Keynote: Dr. Reza Ghanadan (Google AI) Session 5 
Information Security
10am-10:40am Session 1 
CPS Security
Session 3 
Security Games
10:40am-11:30am Interactive 5 with Coffee
11:30am-12:30pm Interactive 1 with Coffee Interactive 3 with Coffee Tutorial on Adversarial ML
12:30pm-1:30pm Lunch Lunch Lunch
1:30pm-3:00pm Session 2
Adversarial AI
Session 4
Threats and Deception
Session 6 
Risk, insurance, & policy
3:00pm-4:00pm Interactive 2 with Coffee Interactive 4 with Coffee Interactive 6 with Coffee
4:00pm-5:00pm Industry Panel Panel: Computing and Games - A look to the future Closing remarks
7:00pm-9pm Welcome reception Banquet dinner

Full Program

The full program can be found here.

Full Papers

  •  Playing Adaptively Against Stealthy Opponents: A Reinforcement Learning Strategy for the FlipIt Security Game
    Lisa Oakley and Alina Oprea
  •  When Players Affect Target Values: Modeling and Solving Dynamic Partially Observable Security Games
    Xinrun Wang, Milind Tambe, Branislav Bosansky and Bo An
  •  On the Optimality of Linear Signaling to Deceive Kalman Filters Over Finite/Infinite Horizons
    Muhammed Sayin and Tamer Basar
  •  Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach
    Kavita Kumari, Murtuza Jadliwala, Anindya Maiti and Hossein Manshaei
  •  Cyber Camouflage Games for Strategic Deception
    Omkar Thakoor, Milind Tambe, Phebe Vayanos, Haifeng Xu, Christopher Kiekintveild and Fei Feng
  •  Adaptive Honeypot Engagement through ReinforcementLearning of Semi-Markov Decision Processes
    Linan Huang and Quanyan Zhu
  •  DeepFP for Finding Nash Equilibrium in Continuous Action Spaces
    Nitin Kamra, Umang Gupta, Kai Wang, Fei Fang, Yan Liu and Milind Tambe
  •  Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals
    Yunhan Huang and Quanyan Zhu
  •  Tackling Sequential Attacks in Security Games
    Thanh Nguyen, Amulya Yadav, Branislav Bosansky and Yu Liang
  •  Discussion of Fairness and Implementability in Stackelberg Security Games
    Víctor Bucarey and Martine Labbé
  •  Solving Cyber Alert Allocation Markov Games With Deep Reinforcement Learning
    Noah Dunstatter, Alireza Tahsini, Mina Guirguis and Jelena Tesic
  •  You Only Lie Twice: A Multi-Round Cyber Deception Game of Questionable Veracity
    Mark Bilinski, Ryan Gabrys, Justin Mauger, Kimberly Ferguson-Walter, Sunny Fugate and Brian Souza
  •  Linear Temporal Logic Satisfaction in Adversarial Environments using Secure Control Barrier Certificates
    Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell and Radha Poovendran
  •  Toward a Theory of Vulnerability Disclosure Policy: A Hacker's Game
    Taylor Canann
  •  General Sum Markov Games for Strategic Detection of Advanced Persistent Threats using Moving Target Defense in Cloud Networks
    Sailik Sengupta, Ankur Chowdhary, Dijiang Huang and Subbarao Kambhampati
  •  Effective Premium Discrimination for Designing Cyber Insurance Policies with Rare Losses
    Mohammad Mahdi Khalili, Xueru Zhang and Mingyan Liu
  •  Design of Load Forecast Systems Resilient Against Cyber-Attacks
    Carlos Barreto and Xenofon Koutsoukos
  •  Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach
    Serkan Sarıtaş, Ezzeldin Shereen, Henrik Sandberg and György Dán
  •  When is a Semi-Honest Secure Multiparty Computation Valuable?
    Radhika Bhargava and Chris Clifton
  •  Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning
    Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee and Radha Poovendran
  •  Perfectly Secure Message Transmission against Independent Rational Adversaries
    Kenji Yasunaga and Takeshi Koshiba
  •  Time-Dependent Strategies in Games of Timing
    Jonathan Merlevede, Benjamin Johnson, Jens Grossklags and Tom Holvoet

Short Papers

  •  Power Law Public Goods Game for Personal Information Sharing in News Commentaries
    Christopher Griffin, Sarah Rajtmajer, Prasanna Umar and Anna Squicciarini
  •  Realistic versus Rational Secret Sharing
    Yvo Desmedt and Arkadii Slinko
  •  Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception
    Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H Anwar and Christopher Kiekintveld
  •  Investing in prevention or paying for recovery - attitudes to cyber risk
    Anna Cartwright, Edward Cartwright and Lian Xue
  •  How to Merge Two Secret Sharing Schemes
    Arkadii Slinko
  •  MTDeep: Moving Target Defense to Boost the Security of Deep Neural Nets Against Adversarial Attacks
    Sailik Sengupta, Tathagata Chakraborti and Subbarao Kambhampati
  •  Honeypot Type Selection Games for Smart Grid Networks
    Nadia Boumkheld, Sakshyam Panda, Stefan Rass and Emmanouil Panaousis
  •  Choosing Protection: User Investments in Security Measures for Cyber Risk Management
    Yoav Ben Yaakov, Xinrun Wang, Joachim Meyer and Bo An
  •  A Framework for Joint Attack Detection and Control Under False Data Injection
    Luyao Niu and Andrew Clark
  •  Dynamic Cheap Talk for Robust Adversarial Learning
    Zuxing Li and György Dán
  •  Cut-The-Rope: A Game of Stealthy Intrusion
    Stefan Rass, Sandra König and Emmanouil Panaousis

GameSec 2019 Proceedings

GameSec 2019 proceedings are published by Springer as part of the LNCS series. During the conference, the proceedings will be available free of charge online.