Title: Game Theory for Cyber Deception
A Tutorial at 2018 Conference on Decision and Game Theory for Security (GameSec 2018)
Seattle, WA, USA, on October 29 – 31, 2018
Speaker: Jeff Pawlick, New York University
Abstract:
Presentation Slides: Downloadable from here .
References:
Taxonomy:
- Pawlick, Jeffrey, Edward Colbert, and Quanyan Zhu. “A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy.” Submitted to ACM Computing Surveys (CSUR). ArXiv Preprint.
Honey-X:
- Pawlick, Jeffrey, Edward Colbert, and Quanyan Zhu. “Modeling and Analysis of Leaky Deception using Signaling Games with Evidence.” Workshop on the Economics of Information Security (WEIS), Innsbruck, Austria, 2018.
- Pawlick, Jeffrey and Quanyan Zhu. “Quantitative Models of Imperfect Deception in Network Security using Signaling Games with Evidence.” IEEE Communications and Network Security (IEEE CNS), 394-395, 2017.
- Pawlick, Jeffrey and Quanyan Zhu. “Deception by Design: Evidence-Based Signaling Games for Network Defense.” Workshop on the Economics of Information Security (WEIS), Delft, The Netherlands, 2015.
Strategic Trust:
- Pawlick, Jeffrey, Juntao Chen, and Quanyan Zhu. “iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things.” Submitted to IEEE Transactions on Information Forensics and Security. ArXiv Preprint.
- Pawlick, Jeffrey and Quanyan Zhu. “Strategic Trust in Cloud-Enabled Cyber-Physical Systems with an Application to Glucose Control.” IEEE Transactions on Information Forensics and Security, vol. 12(12), 2017. 2906-2919.
- Pawlick, Jeffrey, Sadegh Farhang, and Quanyan Zhu. “Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats.” Decision and Game Theory for Security. Springer International Publishing, 2015. 289-308.