Download presentation
Presentation is loading. Please wait.
Published byDeirdre McKenzie Modified over 9 years ago
1
A Game-Theoretic Model for Defending Against Malicious Users in RecDroid Bahman Rashidi December 5 th, 2014
2
1 Overview -Introduction -RecDroid system -Game theoretic model -Nash equilibrium -Discussion -Conclusion
3
2 RecDroid system -What is RecDroid? -A framework, to improve and assist mobile (smartphone) users to control their resource and privacy through crowd sourcing. -Android OS permission granting All-or-Nothing -Two app installation modes: -Probation -Trusted -Real-time resource granting decisions -Expert and peer recommendation system
4
3 RecDroid system (cont.) -RecDroid UI Installation ProcessRecommendation
5
4 RecDroid system (cont.) -RecDroid Functionalities: 1.Collecting permission-request responses 2.Analyzing the responses 3.Recommend low-risk responses to permission requests 4.Expanding expert user base 5.Ranking the apps
6
5 RecDroid system (cont.) -RecDroid’s Components Verification system Environment Knowledge Expert users Users Malicious Regular
7
6 RecDroid system (cont.) -Verification system Environment knowledge Previous responses User behavior App developer Game model Users’ type prediction Security improvement
8
7 Game Theoretic Model -Normal- Form Representation 2 Players Users (Malicious, Regular) RecDroid system Strategies space Users Malicious (Malicious, Not Malicious) Regular (Not malicious) RecDroid (Verify, Not verify)
9
8 Game Theoretic Model (cont.) -Normal- Form Representation Payoff Common parameters Special parameters - Security value - Equal to gain/loss (both of them) -Loss of reputation (RecDroid) -Loss of secrecy (Malicious users) Cost of verification (RecDroid) Cost of responding (Maliciously) Recognition rate (true positive) of the RecDroid False alarm rate (false positive rate)
10
9 Game Theoretic Model (cont.) -Payoff matrix Player i is malicious Player i is regular
11
10 Game Theoretic Model (cont.) -Extensive form
12
11 Game Theoretic Model (cont.) -Bayesian Nash equilibrium (Malicious (malicious user), Not malicious (regular user)) (Malicious, Verify), Not BNE if(Malicious, Verify) (Malicious, Not Verify), Pure strategy BNE
13
12 Game Theoretic Model (cont.) -Bayesian Nash equilibrium (Not Malicious (malicious user), Not malicious (regular user))
14
13 Game Theoretic Model (cont.) -Bayesian Nash equilibrium We analyzed all the existing strategy combinations No pure-strategy when Mixed-strategy
15
14 Game Theoretic Model (cont.) -Bayesian Nash equilibrium Mixed-strategy p : user plays Malicious q : RecDroid plays Verify
16
15 Discussion p is high, RecDroid has a high outcome p is low, User has a high outcome
17
16 Conclusion
18
Thank you !!! Question?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.