A Game-Theoretic Model for Defending Against Malicious Users in RecDroid Bahman Rashidi December 5 th, 2014.

Slides:



Advertisements
Similar presentations
Module 4 Game Theory To accompany Quantitative Analysis for Management, Tenth Edition, by Render, Stair, and Hanna Power Point slides created by Jeff Heyl.
Advertisements

M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 3.1.Dynamic Games of Complete but Imperfect Information Lecture
Game Theory Assignment For all of these games, P1 chooses between the columns, and P2 chooses between the rows.
© 2009 Institute of Information Management National Chiao Tung University Game theory The study of multiperson decisions Four types of games Static games.
Games With No Pure Strategy Nash Equilibrium Player 2 Player
Tacit Coordination Games, Strategic Uncertainty, and Coordination Failure John B. Van Huyck, Raymond C. Battalio, Richard O. Beil The American Economic.
Bayesian Games Yasuhiro Kirihata University of Illinois at Chicago.
Chapter 6 Game Theory © 2006 Thomson Learning/South-Western.
Chapter 6 Game Theory © 2006 Thomson Learning/South-Western.
1 Game Theory. 2 Agenda Game Theory Matrix Form of a Game Dominant Strategy and Dominated Strategy Nash Equilibrium Game Trees Subgame Perfection.
Multiple Criteria Decision Analysis with Game-theoretic Rough Sets Nouman Azam and JingTao Yao Department of Computer Science University of Regina CANADA.
Game Theory 1. Game Theory and Mechanism Design Game theory to analyze strategic behavior: Given a strategic environment (a “game”), and an assumption.
Game Theory: Inside Oligopoly
Game Theory Eduardo Costa. Contents What is game theory? Representation of games Types of games Applications of game theory Interesting Examples.
Time Horizons in Interdependent Security David J. Hardisty, Howard Kunreuther, David H. Krantz, & Poonam Arora Columbia University & University of Pennsylvania.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 3.1.Dynamic Games of Complete but Imperfect Information Lecture
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Game Theory And Competition Strategies
Chapter 6 © 2006 Thomson Learning/South-Western Game Theory.
1 A Game Theoretic Approach for Active Defense Peng Liu Lab. for Info. and Sys. Security University of Maryland, Baltimore County Baltimore, MD OASIS,
A camper awakens to the growl of a hungry bear and sees his friend putting on a pair of running shoes, “You can’t outrun a bear,” scoffs the camper. His.
Algoritmi per Sistemi Distribuiti Strategici
A Crash Course in Game Theory Werner Raub Workshop on Social Theory, Trust, Social Networks, and Social Capital II National Chengchi University – NCCU.
Complexity Results about Nash Equilibria
Harsanyi transformation Players have private information Each possibility is called a type. Nature chooses a type for each player. Probability distribution.
Game theory The study of multiperson decisions Four types of games
6.1 Consider a simultaneous game in which player A chooses one of two actions (Up or Down), and B chooses one of two actions (Left or Right). The game.
1 Teck H. Ho April 8, 2004 Outline  In-Class Experiment and Motivation  Adaptive Experience-Weighted Attraction (EWA) Learning in Games: Camerer and.
Game Theoretic Analysis of Oligopoly lr L R 0000 L R 1 22 The Lane Selection Game Rational Play is indicated by the black arrows.
Game Theory April 9, Prisoner’s Dilemma  One-shot, simultaneous game  Nash Equilibrium (individually rational strategies) is not Pareto Optimal.
EC941 - Game Theory Francesco Squintani Lecture 3 1.
Strategic Modeling of Information Sharing among Data Privacy Attackers Quang Duong, Kristen LeFevre, and Michael Wellman University of Michigan Presented.
박 종 혁 컴퓨터 보안 및 운영체제 연구실 MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications,
A Game Theoretic Framework for Incentives in P2P Systems --- CS. Uni. California Jun Cai Advisor: Jens Graupmann.
Chapter 9 Games with Imperfect Information Bayesian Games.
APKInspector -Static Analysis of Android Applications Student: Yuan Tian Mentor: Cong Zheng Backup Mentor: Anthony Kara Jianwei 08/22/2012.
Game Theory The Prisoner’s Dilemma Game. “Strategic thinking is the art of outdoing an adversary, knowing that the adversary is trying to do the same.
Games of Strategy (Game Theory) Topic 1 – Part IV.
On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks Maxim …...…. Raya Reza …….…. Shokri Jean-Pierre..Hubaux LCA1, EPFL, Switzerland The.
Game Theory (Microeconomic Theory (IV)) Instructor: Yongqin Wang School of Economics and CCES, Fudan University December,
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 4.1.Dynamic Games of Incomplete Information Lecture
Games with Imperfect Information Bayesian Games. Complete versus Incomplete Information So far we have assumed that players hold the correct belief about.
\ B A \ Draw a graph to show the expected pay-off for A. What is the value of the game. How often should A choose strategy 1? If A adopts a mixed.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 2.1.Dynamic Games of Complete and Perfect Information Lecture
Computing and Approximating Equilibria: How… …and What’s the Point? Yevgeniy Vorobeychik Sandia National Laboratories.
GameSec 2010 November 22, Berlin Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger and Jean-Pierre Hubaux EPFL - Laboratory for Computer communications.
On Non-Cooperative Location Privacy: A Game-theoreticAnalysis
How to Analyse Social Network? : Part 2 Game Theory Thank you for all referred contexts and figures.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 0.Game Theory – Brief Introduction Lecture
5.1.Static Games of Incomplete Information
1 The Volunteer’s Dilemma (Mixed Strategies). 2 The Volunteer Dilemma Game Simultaneously and independently, players have to decide if they wish to volunteer.
O N THE O PTIMAL P LACEMENT OF M IX Z ONES : A G AME -T HEORETIC A PPROACH Mathias Humbert LCA1/EPFL January 19, 2009 Supervisors: Mohammad Hossein Manshaei.
Chapter 1 continued.  Observation- something noted with one of the five senses.
Firms Overview  Perfect Competition and Monopoly= Extremes  Oligopolies and Monopolistically Competitive Firms= Dominate U.S. economy  Monopolistically.
Game Theoretic Analysis of P2P Systems Daniel Chen December 4, 2003 GE 493RS.
Econ 805 Advanced Micro Theory 1 Dan Quint Fall 2009 Lecture 1 A Quick Review of Game Theory and, in particular, Bayesian Games.
By: Donté Howell Game Theory in Sports. What is Game Theory? It is a tool used to analyze strategic behavior and trying to maximize his/her payoff of.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 2.1.Dynamic Games of Complete and Perfect Information Lecture
Microeconomics Course E
A Conceptual Design of Multi-Agent based Personalized Quiz Game
BotTracer: Bot User Detection Using Clustering Method in RecDroid
A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems
Non-additive Security Games
Computer Data Security & Privacy
Nash Equilibrium A strategy combination (a,b) is a Nash equilibrium for two players if neither player would unilaterally deviate if he expected the other.
Econ 805 Advanced Micro Theory 1
Analyzing WebView Vulnerabilities in Android Applications
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Game Theory.
M9302 Mathematical Models in Economics
Presentation transcript:

A Game-Theoretic Model for Defending Against Malicious Users in RecDroid Bahman Rashidi December 5 th, 2014

1 Overview -Introduction -RecDroid system -Game theoretic model -Nash equilibrium -Discussion -Conclusion

2 RecDroid system -What is RecDroid? -A framework, to improve and assist mobile (smartphone) users to control their resource and privacy through crowd sourcing. -Android OS permission granting All-or-Nothing -Two app installation modes: -Probation -Trusted -Real-time resource granting decisions -Expert and peer recommendation system

3 RecDroid system (cont.) -RecDroid UI Installation ProcessRecommendation

4 RecDroid system (cont.) -RecDroid Functionalities: 1.Collecting permission-request responses 2.Analyzing the responses 3.Recommend low-risk responses to permission requests 4.Expanding expert user base 5.Ranking the apps

5 RecDroid system (cont.) -RecDroid’s Components  Verification system  Environment Knowledge  Expert users  Users  Malicious  Regular

6 RecDroid system (cont.) -Verification system  Environment knowledge  Previous responses  User behavior  App developer  Game model  Users’ type prediction  Security improvement

7 Game Theoretic Model -Normal- Form Representation  2 Players  Users (Malicious, Regular)  RecDroid system  Strategies space  Users  Malicious (Malicious, Not Malicious)  Regular (Not malicious)  RecDroid (Verify, Not verify)

8 Game Theoretic Model (cont.) -Normal- Form Representation  Payoff  Common parameters  Special parameters - Security value - Equal to gain/loss (both of them) -Loss of reputation (RecDroid) -Loss of secrecy (Malicious users) Cost of verification (RecDroid) Cost of responding (Maliciously) Recognition rate (true positive) of the RecDroid False alarm rate (false positive rate)

9 Game Theoretic Model (cont.) -Payoff matrix  Player i is malicious  Player i is regular

10 Game Theoretic Model (cont.) -Extensive form

11 Game Theoretic Model (cont.) -Bayesian Nash equilibrium  (Malicious (malicious user), Not malicious (regular user)) (Malicious, Verify), Not BNE if(Malicious, Verify) (Malicious, Not Verify), Pure strategy BNE

12 Game Theoretic Model (cont.) -Bayesian Nash equilibrium  (Not Malicious (malicious user), Not malicious (regular user))

13 Game Theoretic Model (cont.) -Bayesian Nash equilibrium  We analyzed all the existing strategy combinations  No pure-strategy when  Mixed-strategy

14 Game Theoretic Model (cont.) -Bayesian Nash equilibrium  Mixed-strategy p : user plays Malicious q : RecDroid plays Verify

15 Discussion p is high, RecDroid has a high outcome p is low, User has a high outcome

16 Conclusion

Thank you !!! Question?