GameSec 2020

Conference on Decision and Game Theory for Security

October 26 - 30, 2020, College Park, Maryland

2020 Conference on Decision and Game Theory for Security

GameSec 2020, the 11th Conference on Decision and Game Theory for Security, will take place at the University of Maryland - College Park, from October 26-30, 2020.

The conference proceedings will be published by Springer as part of the LNCS series.

If you have registered for the conference, you should receive a set of links to sign up for the conference Zoom meeting. Follow those links and fill out the form to receive Zoom meeting invites for each day of the conference. Make sure to attend the correct meeting on each day of the conference!

Conference dates (updated 10/11/2020): GameSec 2020 will be held October 26-30, 2020, from 10:30am-2:00pm Eastern time.

Registration information (important, updated 9/25/2020): GameSec 2020 is free to all participants. Please register at this link.

GameSec 2020 and Covid-19 (important, updated 8/25/2020): Due to the current and predicted evolution of the Covid-19 situation the GameSec 2020 leadership team has decided to hold the GameSec 2020 Conference as a fully interactive, live, online event. All matters related to publication and indexing remain unchanged. Minimal registration fees (if any) for authors of accepted papers will be announced by September 21, 2020. There will be no registration fees for remote no-author attendees. Several invited and keynote addresses and papers will be included in the program and the GameSec 2020 Proceedings volume. Review of papers submitted by August 24 will start immediately. We will consider papers submitted by August 31, 2020 (12 midnight pacific time).

Steering board announcement: We are happy to welcome Prof. Radha Poovendran to the GameSec steering committee!

Description

Modern societies are becoming dependent on information, automation, and communication technologies more than ever. Managing the security of the emerging systems, many of them safety critical, poses significant challenges. The 11th Conference on Decision and Game Theory for Security (GameSec 2020) focuses on protection of heterogeneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods. GameSec 2020 invites novel, high-quality theoretical and practically-relevant contributions, which apply decision and game theory, as well as related techniques such as optimization, machine learning, dynamic control and mechanism design, to build resilient, secure, and dependable networked systems. The goal of GameSec 2020 is to bring together academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connections between game theory, control, distributed optimization, machine learning, economic incentives and real-world security, reputation, trust and privacy problems.

Conference Topics include (but are not restricted to):

GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics:

  • Game theory, control, and mechanism design for security and privacy
  • Decision making for cybersecurity and security requirements engineering
  • Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure
  • Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems
  • Risk assessment and security risk management
  • Security and privacy of wireless and mobile communications, including user location privacy
  • Socio-technological and behavioral approaches to security
  • Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy
  • Adversarial Machine Learning and the role of AI in system security
  • Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework

Special Track on Machine Learning and Cyber Security

Machine learning provides a set of useful analytic and decision-making tools for a wide range of applications. Security research aims to address the issue of protecting networks from adversarial behaviors. The confluences between the two are increasingly important as we witness recent advances in adversarial machine learning and machine learning for security big data processing. This special track invites submissions on various data-centric models and approaches. For submissions, please select the track “Machine Learning and Cyber Security” during the submission.

Paper Submission

Authors should consult Springer’s authors’ guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Springer encourages authors to include their ORCIDs in their papers. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.

Keynote Speakers

Photo: Nicole Newmeyer
Nicole Newmeyer

Bio : Nicole Newmeyer is the Technical Director for NSA Internet of Things (IoT) Integration. She is responsible for guiding short term and strategic direction, providing technical leadership to capability development teams, and providing technical recommendations to leadership focusing on integrating IoT across all of the NSA’s missions. She is a graduate of the Agency’s Senior Technical Development Program, focused on understanding the impact of Internet of Things technologies. Ms. Newmeyer has held technical leadership positions in both the signals intelligence and cybersecurity missions at NSA. She holds a B.S. in Computer Science from the University of Maryland, Baltimore County, and is working toward a M.S. in Technology Intelligence at the National Intelligence University. She is a co-chair for NSA’s Women in Technology group, a component of the Women’s Employee Resource Group, and is an active advocate, leader, and mentor; she has been recognized for her focus on mentoring and working to grow the next generation of technologists at NSA.

Title : NSA, IoT, and You
Slides : TBD
Abstract : When most people think about Internet of Things (IoT) technologies, they think of the new and changing opportunities the technology presents. For NSA, IoT is much more than that, it is changing how humans interact with the physical world; we all need to not only be aware of the potential opportunities the use of the technology affords us, but also the cybersecurity and privacy implications of IoT and other emerging technologies. Join me for a high level overview of how NSA views IoT, and some discussion of its broader impacts on society as a whole.


Photo: Dr. Jens Palsberg
Prof.
Jens Palsberg

Bio : Jens Palsberg is a Professor and former Department Chair of Computer Science at University of California, Los Angeles (UCLA). His research interest is in the area of programming languages and compilers, and he teaches quantum programming as well as classical compilers. He is a member of the NSF Quantum Leap Institute that was established in 2020 and is led by Berkeley. This institute tackles far-reaching questions at the heart of quantum computation. He is also a member of the ACM Executive Committee, the chair of ACM SIGPLAN, and a member of the editorial board of Information and Computation. In 2012 he received the ACM SIGPLAN Distinguished Service Award.


Title : Towards Quantum Security Games
Slides : TBD
Abstract : Quantum computing has been relevant to security ever since the invention of Shor's algorithm for factoring integers. As large-scale quantum computing and the quantum internet become reality, we need techniques for quantum security, particularly games. I will discuss quantum computing, quantum games, and the opportunities and challenges in using quantum security games to protect critical infrastructure.


Academic Panel: AI/ML in Games

Photo: Fei Fang
Prof. Fei Fang

Bio : Fei Fang is an Assistant Professor in the School of Computer Science at Carnegie Mellon University. Before joining CMU, she was a Postdoctoral Fellow at Harvard University. She received her Ph.D. from the University of Southern California in June 2016. Her research lies in the field of artificial intelligence and multi-agent systems, focusing on integrating machine learning with game theory. Her work has been motivated by and applied to security, sustainability, and mobility domains, contributing to the theme of AI for Social Good. Her work has won multiple distinguished paper awards at AI conferences. Her dissertation is selected as the runner-up for IFAAMAS-16 Victor Lesser Distinguished Dissertation Award.


Photo: Haifeng Xu
Prof. Haifeng Xu

Bio : Haifeng Xu is the Alan Batson Assistant Professor in computer science at the University of Virginia, where he directs the Sigma Research Lab. He works broadly on game theory, machine learning and algorithms, with a particular focus on studying how incentives/information/data affect learning and decision making. Prior to UVA, Haifeng was a postdoc at Harvard and obtained his PhD in Computer Science from the University of Southern California. His research has been recognized by multiple awards, including a Google Faculty Research Award, honorable mention for the ACM SIGecom Dissertation Award, runner-up for the IFAAMAS Victor Lesser Distinguished Dissertation Award, a Google PhD fellowship, the 2016 AAMAS best student paper award, and the 2016 SecMas Workshop best paper award.


Photo: Bo Li
Prof. Bo Li

Bio : Bo Li is an assistant professor in the department of Computer Science at University of Illinois at Urbana–Champaign, and the recipient of the Symantec Research Labs Fellowship, Rising Stars, MIT Technology Review TR-35 award, Intel Rising Star award, Amazon Research Award, and best paper awards in several machine learning and security conferences. Her research focuses on both theoretical and practical aspects of security, machine learning, privacy, game theory, and adversarial machine learning. She has designed several robust learning algorithms, scalable frameworks for achieving robustness for a range of learning methods, and a privacy preserving data publishing system. Her work has been featured by major publications and media outlets such as Nature, Wired, Fortune, and New York Times.


Photo: Tansu Alpcan
Prof. Tansu Alpcan

Bio : Tansu Alpcan received the Ph.D. degree in Electrical and Computer Engineering from University of Illinois at Urbana-Champaign (UIUC) in 2006. His research interests include applications of control, optimisation, and game theories, and machine learning to security and resource allocation problems in communications, smart grid, and Internet-of-Things. He chaired or was an Associate Editor, TPC chair, or TPC member of several prestigious IEEE workshops, conferences, and journals. Tansu Alpcan is the (co-)author of more than 150 journal and conference articles as well as the book “Network Security: A Decision and Game Theoretic Approach” published by Cambridge University Press (CUP) in 2011. He co-edited the book “Mechanisms and Games for Dynamic Spectrum Allocation” published by CUP in 2014. He has worked as a senior research scientist in Deutsche Telekom Laboratories, Berlin, Germany (2006-2009), and as Assistant Professor (Juniorprofessur) in Technical University Berlin (2009-2011). He is currently with the Dept. of Electrical and Electronic Engineering at The University of Melbourne as a Professor and Reader.


Photo: J. Sukarno Mertoguno
Dr. J. Sukarno Mertoguno

Bio : J. Sukarno Mertoguno serves as chief innovation officer for the Information and Cyber Science Directorate (ICSD) of Georgia Tech Research Institute (GTRI), Deputy Director at Institute for Georgia Tech's Information Security and Privacy and a faculty for School of Cyber Security and Privacy. He received his Ph.D. in electrical engineering from SUNY-Binghamton. His education background includes theoretical physics and electrical engineering. He brings in and develops innovative concepts for GTRI. Before joining Georgia Tech, Dr. Mertoguno managed basic and applied scienctific research in cybersecurity and complex software for The Office of Naval Research (ONR). Sukarno was the lead program officer for ONR TPCP program, initiating an innovative research area for COTS attack-surface reduction in 2012. He also developed several novel concepts, such as BFT++, Learn2Reason, CryptoFactory, NoiseFactory, and bottom-up formal methods. Before ONR, he was a system & chip architect and an entrepreneur in the San Francisco Bay Area, where he worked on various chips and systems, such as embedded processors, switching fabric, network processors, and various other hardware accelerators, including TCP/IP, NFS, mobile anti-malware, etc.

Industry Panel: Security and Trust for the Future Networked-Immersed World

Photo: Chris Christou
Chris Christou

Bio : Chris Christou is a Vice President in the Booz Allen Hamilton Strategic Innovations Group (SIG). He leads the team providing 5G and Cloud Security solutions across multiple public sector and commercial markets. The service offerings and capabilities that Chris and his team are developing include those related to 5G network engineering, 5G platform integration, and 5G security. Chris’ team engineers and operates secure cloud environments and has developed Virtual Cloud Defense, which provides blueprints to secure cloud platforms. Chris is a graduate of the University of Virginia and the University of Maryland School of Engineering where he obtained a M.S. in Telecommunications and a Graduate Certificate in Engineering.


Photo: Mike Spanbauer
Mike Spanbauer

Bio : Mike Spanbauer is a Technology Evangelist for Juniper Security. Mike’s work and expertise in network and security advisory, consulting, and product strategy over the last 25 years provides a breadth of perspective across network and security execution, as well as approaches to solve for operational and governance needs that organizations face. He most recently served as Vice President of Research Strategy for NSS Labs, driving the enterprise research and consulting practice for NSS’ global clients. Prior to that, Mike held leadership roles at Current Analysis and HP in research, strategy, and competitive intelligence. Throughout his career, Mike has possessed a passion to help guide organizations to make well-informed decisions that ensure delivery on their intended technical outcomes. He brings this passion to Juniper’s customers, partners, and prospects, listening to their needs and challenges ensuring Connected Security continues to solve them, day in and day out.


Photo: Marina Thottan
Marina Thottan

Bio : Marina Thottan leads the Networks and Security Research Lab in Nokia Bell Labs. She joined Bell Labs Research in 1999, and has contributed to a wide variety of projects, including Content Distribution, Routing protocols, Data over Optical networks, High Speed Router Design, Network Management and Anomaly Detection. Most recently she has been leading work on Network Orchestration, Network Slicing, and 5G Security. She is a Bell Labs Fellow and an IEEE Fellow. Marina received a Ph.D. in Electrical and Computer Engineering from Rensselaer in 2000. She is co-author of the book “Communication Networks for Smart Grids: Making Smart Grids Real” and has also Co-edited a book on “Algorithms for Next Generation Networks”.


Photo: Stuart Wagner
Stuart Wagner

Bio : Dr. Stuart Wagner is a senior program director of network and distributed systems research at Perspecta Labs. His responsibilities include formulating and leading multidisciplinary research efforts, principally in the fields of networking, cybersecurity and computer science to create unique technical capabilities for both government and commercial stakeholders. Stuart served as a program manager in the Defense Advanced Research Projects Agency’s (DARPA) Information Innovation Office (I2O) from 2014-2017, where he initiated and led the Edge Directed Cyber Technologies for Reliable Mission Communication (EdgeCT), Extreme Distributed Denial of Service Defense (XD3) and Dispersed Computing programs, while also managing several other I2O efforts in cybersecurity research. Prior to joining DARPA, his career included more than 25 years at Bellcore, Telcordia and Applied Communication Sciences, where he most recently served as an assistant vice president and chief scientist. Stuart attended the Massachusetts Institute of Technology, where he received bachelor’s degrees in physics and electrical engineering, a master’s degree in electrical engineering, and a doctorate in electrical engineering. He has authored more than 80 papers on diverse topics in computer networking.


Conference Sponsors and Supporters

We thank all our sponsors for their kind support.

GameSec 2020 Proceedings

GameSec 2020 proceedings will be published by Springer as part of the LNCS series. During the conference, the proceedings will be available free of charge online.