Advances in Game Theory for Security and Privacy Bo An Fei Fang Yevgeniy Vorobeychik (Nanyang Technological University, [email protected]) (Harvard University->CMU, [email protected]) (Vanderbilt University, [email protected]) June 26, 2017@EC’17, MIT (slides adapted from related tutorials and talks) More resources: http://teamcore.usc.edu/projects/security Global Challenges for Security Key challenges: Limited resources, surveillance 2 Stackelberg Games Randomization: Increase Cost and Uncertainty to Attackers Security allocation: (i) Target weights; (ii) Opponent reaction Stackelberg: Security forces commit first Optimal allocation: Weighted random Strong Stackelberg Equilibrium Attacker Defender Target #1 Target #2 Target #1 4, -3 -1, 1 Target #2 -5, 5 2, -1 3 Game Theory for Security Models adaptive adversaries Attackers change strategies as the security policy changes Game models can be very expressive: Information/intelligence about relative risk, vulnerability, consequence, desirability, etc. Attackers using surveillance and insider knowledge Complex attack and defense strategies Realistic models of human behavior Uncertainty about model parameters Key research issues Solving large scale games Uncertainty, robustness Human behavior Learning, planning …… 4 Game Theory for Security: Applications Game Theory + Optimization + Uncertainty + Learning + … Infrastructure Security Games Coast Guard Green Security Games Opportunistic Crime Games Coast Guard: Ferry Coast Guard LAX TSA Cyber Security Games Panthera/WWF LA Sheriff USC Argentina Airport Chile Border India Global Presence of Security Games Efforts Outline Motivating real-world applications Game theory and security game foundaction Algorithms and some recent progress Human behavior modeling & learning Game theory for cyber security Game theory for privacy 7 ARMOR: Deployed at LAX 2007 “Assistant for Randomized Monitoring Over Routes” Problem 1: Schedule vehicle checkpoints Problem 2: Schedule canine patrols Randomized schedule: (i) target weights; (ii) surveillance ARMOR-Checkpoints ARMOR-K9 8 ARMOR Canine: Interface 9 Federal Air Marshals Service (FAMS) Undercover, in-flight law enforcement International Flights from Chicago O’Hare Flights (each day) ~27,000 domestic flights ~2,000 international flights Not enough air marshals: Allocate air marshals to flights? 10 Federal Air Marshals Service (FAMS) Massive scheduling problem Adversary may exploit predictable schedules Complex constraints: tours, duty hours, off-hours 100 flights, 10 officers: 1.7 ×1013 combinations Overall problem: 30000 flights, 3000 officers Our focus: international sector 11 IRIS: “Intelligent Randomization in International Scheduling” (Deployed 2009) 12 PROTECT (Boston, NY and Beyond) US Coast Guard: Port Resilience Operational / Tactical Enforcement to Combat Terrorism Randomized patrols; deployed in Boston, NY, etc More realistic models of human behaviors 13 Protecting Moving Targets: Ferries Protecting ferries with patrol boats Staten Island Ferry: over 20 million people a year (60,000 passengers a day on weekdays) Protecting refugee aid convoys with helicopters 14 Beyond Counterterrorism: LA Metro LA Sheriff’s Dept (Crime suppression & ticketless travelers): 15 Beyond Counterterrorism: Other Domains Customs and Border Protection Cybersecurity Environmental protection Forest Fish Wildlife Wildlife Queen Elizabeth National Park Uganda 16 Normal Form Games (Strategic Form Games) Problem/game representation: List of players, strategies, payoffs Simultaneous Zero-sum here but not necessary Player B Paper Player A Stone Scissors Paper Stone Scissors 0, 0 1,-1 -1,1 -1, 1 0, 0 1, -1 1, -1 -1, 1 0, 0 17 Solution Concepts Nash Equilibrium A (mixed) strategy for each player such that no player benefits from a unilateral deviation Target1 Target 2 Target 1 1, -1 -1, 1 Target 2 -1, 1 1, -1 18 Stackelberg Game: Non-Simultaneous Moves What is the Nash equilibrium if it were a simultaneous move game? What if not simultaneous move game: Alex [Leader] commits to strategy first Bob [Follower] optimize against leader’s fixed strategy Bob Alex Nash Equilibrium: <a,c> c d a 2,1 4,0 b 1,0 3,2 What if leader (Alex) commits to “b” What will be Bob’s response? Stackelberg Game: Non-Simultaneous Moves What if not simultaneous move game: Alex [Leader] commits to strategy first Bob [Follower] optimize against leader’s fixed strategy Leader Commitment payoff: 3.5 > 2 Bob Alex Nash Equilibrium: <a,c> c d a 2,1 4,0 b 1,0 3,2 Leader commits to uniform random strategy {.5,.5} Follower plays d: Leader payoff: 3.5 > 2 First mover advantage in Stackelberg Games Leader can commit to mixed strategy Not play simultaneous move Nash equilibrium “Stong Stackelberg equilibrium” Break ties in favor of the defender Leader’s payoff may improve over Nash Heinrich Freiherr von Stackelberg 1905-1946 21 Security Games Two players Defender Attacker Set of targets: T Set of resources: R Defender assigns resources to protect targets Attacker chooses one target to attack Payoffs define the reward/penalty for each player for a successful or unsuccessful attack on each target Not always zero-sum An attack on a defended target is better than an attack on the same target if it is undefended (for the defender) 22 Stackelberg Equilibrium Formulations 8 roads 3 checkpoints 8 terminals 56 pure strategies for defender 8 pure strategies for attacker Terminal #1 Terminal #2 … Terminal #8 Road 1,2,3 5, -3 2, -3 … -6, 5 Road 1,2,4 5, -3 2, -3 … -5, 5 -1, 1 … … … … Checkpoint at LAX Road 6,7,8 3, -8 23 Algorithm 1: Multiple LPs [Conitzer & Sandholm 2006] Solve for 1 adversary action at a time Adversary’sPayoff Payoff Defender’s Terminal #2 … Terminal #8 Road 1,2,3 5, -3 2, -3 … -6, 5 Road 1,2,4 5, -3 2, -3 … -5, 5 -1, 1 … … Terminal #1 … … Road 6,7,8 3, -8 24 Multiple LPs Solve for 1 adversary action at a time Terminal #2 … Terminal #8 Road 1,2,3 5, -3 2, -3 … -6, 5 Road 1,2,4 5, -3 2, -3 … -5, 5 -1, 1 … … Terminal #1 … … Road 6,7,8 3, -8 25 Algorithm 2: DOBSS MILP 8 roads 3 checkpoints 8 terminals 56 pure strategies for defender 8 pure strategies for attacker Terminal #1 Terminal #2 … Terminal #8 Road 1,2,3 5, -3 2, -3 … -6, 5 Road 1,2,4 5, -3 2, -3 … -5, 5 -1, 1 … … … … Checkpoint at LAX Road 6,7,8 3, -8 26 Algorithm 2: DOBSS Defender’s Expected Utility Requires enumeration of Defender’s Strategy all pure strategies Attacker’s Strategy Payoffs } Stackelberg Equilibrium Constraints q is a “best-response” to x 27 Efficient Algorithms Challenges: combinatorial explosions due to: Defender strategies: Allocations of resources to targets E.g. 100 flights, 10 FAMS Adversary types: Adversary strategy combination Attacker strategies: Attack paths E.g. Multiple attack paths to targets in a city Basic approaches like Multiple-LPs do not scale Idea: exploit problem structure Compact representations Techniques for large-scale optimization (e.g., strategy generation) 28 Scale Up in Number of Defender Strategies [2009] Marginals of Mixed Strategies: Target Independence (IRIS) max x ,q p R x q ij i Attack Attack Attackj ARMOR: 10 flights, 3 air marshals Payoff duplicates: Depends covered l lon target l ARMOR Actions 1 2 3 … 120 Flight combos Prob 1,2,3 1,2,4 1,2,5 … 8,9,10 x123 x124 x125 … … iX lL jQ 1 2 … s.t1,2,3 . x5,-10 1 i 1, q … Attack 6 l 4,-8 j jQ -20,9 1,2,4i 5,-10 4,-8 … -20,9 l l l 0 ( a 5,-10Cij-9,5 xi ) … (1 q j-20,9 )M 1,3,5 iX … … … … … xi [0...1], q {0,1} l j Compact Action Flight Prob 1 2 3 … 10 1 2 3 … 10 y1 y2 y3 … y10 “Marginals”: 10 variables in MIP: y1 = x123+x124+x125… y1+y2+y3…=3 Sample y (loses combination info) 29 Scale Up in Number of Defender Strategies [2009] Marginals of Mixed Strategies: Target Independence (IRIS) ARMOR: 10 flights, 3 air marshals Payoff duplicates: Depends on target covered ARMOR Flight combos Prob 1,2,3 1,2,4 1,2,5 … 8,9,10 x123 x124 x125 … … Compact Action Flight Prob 1 2 3 … 10 1 2 3 … 10 y1 y2 y3 … y10 Actions 1 2 3 … 120 Attack Attack Attack Attack 1 2 … 6 1,2,3 1,2,4 1,3,5 … 5,-10 5,-10 5,-10 … 4,-8 4,-8 -9,5 … … … … … -20,9 -20,9 -20,9 … “Marginals”: 10 variables in MIP: Sample y (loses combination info) Sampling difficult if constraints on combinations; interacting tours 30 ORIGAMI Are there any cases of security games that can be solved in polynomial time? Yes! Restricted class of security games: At most one resource per target No scheduling restrictions All resources are identical For this class of security games, ORIGAMI is a polynomial algorithm Can be used as a heuristic in more complex algorithms 31 ORIGAMI Example t1 t2 t3 t4 Cover Uncov Cover Uncov Cover Uncov Cover Uncov Defender’s utility Attacker’s utility 1 0 3 0 7 0 5 0 0 1 0 2 0 3 0 4 Four targets One defender 32 ORIGAMI Four targets One resource Zero Sum Attacker payoffs 0 0 0 Uncovered Covered 4 0 3 0 2 0 1 0 0 Coverage Probability 33 ORIGAMI Attack Set: Set of targets with maximal expected payoff for the attacker 0 0 0 0 Coverage Probability 34 ORIGAMI Observation 1 It never benefits the defender to add coverage outside the attack set. 0 0 0.5 0 Coverage Probability 35 ORIGAMI Compute coverage necessary to make attacker indifferent between 3 and 4 0.25 0 0 0 Coverage Probability 36 ORIGAMI Observation 2 It never benefits the defender to add coverage to a subset of the attack set. 0.5 0 0 0 Coverage Probability 37 ORIGAMI 0.5 0.33 0 0 Coverage Probability 38 ORIGAMI Need more than one resource. 0.75 0.66 0.5 0 Coverage Probability 39 ORIGAMI Can still assign 0.17 0.5 0.33 0 0 Coverage Probability 40 ORIGAMI Allocate all remaining coverage to flights in the attack set Fixed ratio necessary for indifference 0.54 0.38 0.08 0 Coverage Probability 41 Challenge Need to sample Sampling not necessarily possible / optimal in complex domains Dealing with scheduling constraints 42 IRIS: Federal Air Marshals Service [2009] Scale Up Number of Defender Strategies Strategy 1 Strategy 2 Strategy 3 Strategy 1 Strategy 1 Stra teg y1 Strategy 2 Stra teg y2 Strategy 3 Stra teg y3 Strategy 4 Stra teg y4 Strategy 5 Stra teg y5 Strategy 6 Stra teg y6 1000 Flights, 20 air marshals: 10 41 Strategy 2 Strategy 3 combinations ARMOR out of memory Not enumerate all combinations: Branch and price: Branch & bound + column generation 43 IRIS: Scale Up Number of Defender Strategies [2009] Small Support Set for Mixed Strategies Small support set size: Many xi variables zero 1000 flights, 20 air marshals: 41 10 combinations max x ,q Rij xi q j Attack Attack Attack Attack 1 2 … 1001 iX jQ s.t. xi 1, q j 1 x123=0.0 1,2,3.. 5,-10 4,-8 x124=0.239 1,2,4.. 5,-10 4,-8 1,3,5.. 5,-10 -9,5 Cij xi ) (1 x135=0.0 q j )M jQ i 0 (a iX x378=0.123 xi [0...1], q {0,1} j … … … … … -20,9 -20,9 -20,9 1041 rows 44 IRIS: Incremental Strategy or Column Generation Exploit Small Support Master Slave (LP Duality Theory) Attack 1 Attack 2 Attack… Attack 6 1,2,4 5,-10 4,-8 … -20,9 Best new pure strategy: Minimum cost network flow Target 3 Attack 1 Attack 2 Attack… Attack 6 1,2,4 5,-10 4,-8 … -20,9 3,7,8 -8, 10 -8,10 … -8,10 Target 7 Resource Sink … … Converge Attack 1 Attack 2 Attack 1,2,4 3,7,8 … 5,-10 -8, 10 Attack 6 rows -20,9 4,-8500 … 41 -8,10 … NOT 10 -8,10 45 Strategy Generation Revisited Fully connected Graph 20 intersections, 190 roads 5 resources, 1 target ~ 2 billion defender allocations 6.6 quintillion (1018) attacker paths Real Problem: ~30,000 intersections ~70,000 roads 46 Strategy Generation for Both Players Master Slave: Defender Slave: Attacker 47 Strategy Generation for Both Players Properties: Master ■ NP-Hard Slave: Defender ■ Sub-modular Algorithms: ■ Optimal MILP ■ Heuristic algorithm Slave: Attacker 48 Strategy Generation for Both Players Properties: Master ■ NP-Hard Slave: Defender ■ Sub-modular Algorithms: ■ Optimal MILP ■ Heuristic algorithm Slave: Attacker Reduction from Set-Cover 49 Strategy Generation for Both Players Properties: Master ■ NP-Hard Slave: Defender ■ Sub-modular Algorithms: ■ Optimal MILP ■ Heuristic algorithm Slave: Attacker Optimal MILP 50 Strategy Generation for Both Players Properties: Master ■ NP-Hard Slave: Defender ■ Sub-modular Algorithms: ■ Optimal MILP ■ Heuristic algorithm Slave: Attacker Sub-modularity 51 Strategy Generation for Both Players Properties: Master ■ NP-Hard Slave: Defender ■ Sub-modular Algorithms: ■ Optimal MILP ■ Heuristic algorithm Slave: Attacker Greedy Heuristic 52 Strategy Generation for Both Players Heuristic Slave: Defender Master Useful: No Useful: Yes Slave: Defender Slave: Attacker 53 Summary of Insights Compact representation of security games Large-scale optimization techniques for scaling up # actions Column / cut generation subproblem: network flow Compact representation of strategy space as marginals 54 Some Recent Progress (2015-) Dynamic resource allocation [IJCAI’15] Optimally monitoring potential terrorists [AAAI’16a] Coalitional security games [AAMAS’16] Protection externality [AAAI’15,17a] Interdict illegal network flow [IJCAI’16a,17a] Strategic Secrecy in Security Games [IJCAI’17b] Adversarial Machine Learning [IJCAI’17c] Mitigate sequential spear phishing [AAAI’16b] Protect elections [IJCAI’16b] Protect coral reef ecosystems [IJCAI’16c] Optimal defense against man-in-the-middle attack [AAAI’17b, IJCAI’17e] Efficient container inspection [AAMAS’17] 55 Protecting Large Public Events [AAAI’14] Target value changes over time Utility of attacking a target decreases with # of protecting resources Idea: Dynamically allocate security resources Transfer resources at any time A resource in transfer is not protecting any target 3 4 2 1 Boston Marathon Bombings Varying target value v (t) i 56 SCOUT-A:Negligible Transfer Time Context: Resources can be transferred quickly Find the minimax assignment of resources at each time point Example: 2 targets (T1, T2), 2 resources Target value Infeasible find the minimax assignment at ResourcestoAttacker utility each time (0) time is continuous 0 pointv1since v (t) v1 (0) / e T1 l v1(t) 2 v1 (0) / e2 l 0 T2 v2 (0) v2 (0) / el v2 (0) / e2 l Minimax assignment at time 0 0 1 2 3 t-time 4 5 57 SCOUT-A:Negligible Transfer Time (2) ‘Minimax assignment’ does not change continuously Attacker Utility v2(t) 0 T1 T1 v2(t) / eλ T2 SCOUT-A computes the time point at which v2(t) / ea2λ minimax assignment ‘expires’, then finds the ‘next’ v1(t)minimax 0 assignment v (t) / eλ T2 T1 1 T2 v1(t) / e2λ 0 1 2 3 4 t-time 5 58 SCOUT-C: Nonzero Transfer Time Key Theorem For any game with continuous defender strategy space, we can construct an equivalent game with discrete defender strategy space Initial Game te 0 Transfer at any time Constructed Game t 0 e Transfer at discretized points The equilibrium of the constructed game is also an equilibrium of the initial game 59 Mixed Strategy EQ for Dynamic Payoff Games [IJCAI’15] Dynamic Payoffs: Targets’ importance changes Importance Bar street Mixed strategy Museum Time Distribution over pure strategies (Infinite & Continuous support set) Mixed strategy Compact representation Coverage functions ci (t): Probability of protecting target i at time t Pure strategy 1 (0.5) Target 1: 6:00 – 12:00 Target 2: 12:00 – 18:00 Pure strategy 2 (0.5) Target 1: 6:00 – 10:00 Target 2: 10:00 – 18:00 1, t [6 : 00,10 : 00) c1 (t ) 0.5, t [10 : 00,12 : 00) 0, t [12 : 00,18 : 00] Theorem: Coverage functions can be implemented by sampling pure strategies with finite transfers 60 ADEN: Nonzero Transfer Time A resource may be in transfer at time t (COCO cannot work) Approach: Discretize game by an (e ,d ) - Mesh vi (t ) v1 (t ) tk vi (t ) £e d t k+1 v1 (tk ) t k+1 tk Theorem: Discretizing game by (e ,d ) - Mesh leads to a loss of at most ε Weight of point (k,i) target : stay : : transfer s Value of target i at time tk in the bridge game v'i (t k ) Theorem: A mixed strategy t i 1 k k+1 k+aij T An m-unit fractional flow Complexity: O( te n 2 ) (FPTAS for Lipschitz continuous value functions ) 61 Detecting Terrorist Plots [AAAI’16a] Paris Shootings on January 7, 2015 Two Kouachi brothers stormed into the Paris office of Charlie Hebdo and gunned down 12 people A few hours later, Amedy Coulibaly killed a policewoman in Montrouge and Chérif Kouachi four hostages at a kosher supermarket in east Paris A coordinated plot planned by al-Qaeda in the Arabian Peninsula (AQAP) Saïd Kouachi Monitoring potential terrorists! Terrorist planners (e.g., ISIS): Arouse a connected subgroup terrorist network Conduct surveillance Charlie Hebdo Amedy Coulibaly Security agencies (e.g., DGSE) Decide how to allocate limited security resources to monitor the terrorists 62 21 TPD: Utility Function and Equilibrium Zero-sum Game: If overlap, defender wins: Example: If not, attacker succeeds: Example: 3 1 Ua Ud 0 U a P( A42 ), U d P( A42 ) 2 4 6 Attacker utility of choosing subgraph A: 5 P(A) = å vÎA (t v + d å uÎN Av tu) neighborhood of v in subgraph A the extent of positive network externality 63 DO-TPD: Overview Start from a small strategy space<S’,A’> Solve the restricted game LP(S’,A’) Defender Oracle Attacker Oracle If find no solution bestO-A If find no solution betterO-A betterO-D Find a new strategy set A+ to improve the solution S’=S’ U S+, A’=A’ U A+ Yes bestO-D Find a new strategy set S+ to improve the solution A+ or S+ found? No Global optimality reached! END Theorems: • • BestO-D/bestO-A is NP-hard; BetterO-A/betterO-D guarantees a (1-1/e)-approximation ratio 64 Coalitional Security Games [AAMAS’16] al-Qaeda Other terrorist groups “The interconnected nature of terrorist organizations necessitates that we pursue them across the geographic spectrum to ensure that all linkages between the strong and the weak organizations are broken, leaving each of them isolated, exposed, and vulnerable to defeat.” -CIA National Strategy for Combating Terrorism 65 CSG: Strategies, Utility and Equilibrium Strategies Defender: blocking a set of edges Attacker: playing coalitional game and forming a coalitional structure 𝐶2𝐶2 Utility Coalition value: capability of attacking targets (knapsack problem) 𝑣(𝐶1 ) = 20 𝑣(𝐶2 ) = 10 𝐶1 blocking costs: 10 Value: 10 Value: 20 66 CSG: Branch and Price Algorithm Column generation Solving large-scale LP relaxation UB branching LB≥UB or 𝑩∗ integral 𝑩𝟏𝟐 =0 Master Problem LB<UB & 𝑩∗ fractional LP, solve to optimality LP RELAXATION 𝑩𝟏𝟐 =1 Interior Point Stabilization LPs, get interior dual solution pruning Theorems: Slave problem 𝑩𝟏𝟑 =0 𝑩𝟏𝟑 =1 • CSG problem is MAX SNP-hard Bilevel MILP, optimal value: 𝒓∗ • Our algorithm achieves constant factor approximation Branch and bound Solving integer program LP Relaxation Greedy Single MILP Polynomial-time ADD COLUMN ∗ GE𝐓 𝑩 & LB 𝒓∗ <0 NO YES 67 Security Games with Protection Externalities [AAAI’15] Protection Externalities (PE) One resource protects multiple targets simultaneously Many real-world scenarios: ferry ship… NP-hard to compute the equilibrium Reduction from Set Cover A Column Generation based solution algorithm: SPE ① 𝑁 target-defined LPs (t-LP) A MILP formulation for the slave procedure A constant-factor greedy approach to speed up ③An upper bound LP for pruning (u-LP) 1 2 Pruning u-LP 1 u-LP 2 t-LP 1 t-LP 2 CG CG u-LP 𝑁 … 3 … ②Column Generation for t-LP t-LP 𝑁 CG max t−LP 𝑖 𝑖 68 SPE on a Plane [AAAI’17a] A more realistic setting A planar topology Resource allocation in a continuous space (not restricted to targets) Easier? Harder? NP-hard Reduction from Euclidian Disc Cover: if 𝑛 given points on a plane can be covered by 𝑚 identical disks. Inapproximable: no PTAS unless P=NP Approximable for zero-sum games: a PTAS 69 A PTAS based on Grid Shifting Divide the plane with a grid 𝒢1 Shift 𝒢1 to obtain grids 𝒢2 , … , 𝒢l A new pure strategy space S in which each pure strategy fits into one grid (not overlapping grid lines) Compute x ∗ , the optimal defender strategy under S (Polynomial time computable: ellipsoid method + Dynamic programming for the separation oracle) 2 U(x ∗ ) is a 1 − -approximation to the optimal solution l under the original strategy space None zero-sum games Inapproximable in general but solutions with guaranteed quality can be obtained efficiently if: The game is quasi-zero-sum (as is in most real scenarios) Solutions are restricted to robust ones 70 Network Flow Interdiction Games [IJCAI’16] Drug Smuggling Illegal drug trafficking is a world wide issue Checkpoints are operated to prevent drug trafficking Challenges Limited security resources Strategic smugglers Exponential-sized strategy spaces Solutions Network flow interdiction game model Column and constraint generation algorithm 12 a b 16 s 20 10 4 9 t 7 13 4 c 14 d 71 Repeated Network Interdiction Problems [IJCAI’17a] Limitation of Existing Models Human adversaries are not fully rational Defender has few prior knowledge of adversary Interactions between agents are frequent Repeated Network Interdiction Game Online Learning Framework 6 units interdicted 12 a 12 b 16 s 10 13 4 c 20 9 7 14 d t 5 units 4interdicted 4 Transformation to Online Linear Optimization exploration estimating the adversarial flow with unbiased estimator exploitation applying FPL on the estimated adversarial flow sequence SBGA algorithm 72 SBGA Input: Estimated flow sequence 12 6 units 12 a 1 2 𝑡−1 b interdicted 𝒇 , 𝒇 16, … , 𝒇 Exploration Unbiased estimator s Exploitation 10 4 20 9 7 Perturbed by a random noise vector 13 c 14 d 𝒛 Follow the perturbed leader (FPL) t 5 units 4interdicted 4 Theoretical Guarantees 𝑡 Output: 𝒘𝑡 = 6 0 0.5 1 𝑡−1 𝑓1 𝑎𝑟𝑔 max 𝒘 ∙ (𝒇 + ⋯ + 𝒇 + 𝒛) Theorem: 𝒘 With proper learning parameters, we have: 𝑅𝑇 𝑆𝐵𝐺𝐴 = 𝒪(𝑇 2/3 ). 𝑡 0.25 0.5 𝑓2 5 Greedy algorithm Convex 1 − 1/𝑒 Theorem: 𝑡 † 𝑡optimization 𝒓 𝒇 approximation With proper learning parameters, we have: = 𝑊 2 3 𝛿 ∙ 𝑂𝑃𝑇 − 𝑅𝑒𝑤𝑎𝑟𝑑(𝑆𝐵𝐺𝐴) ≤ 𝒪 𝑇 , where 𝑂𝑃𝑇 is the utility of the optimal adaptive defender policy and 𝛿 is a constant depending on the interdiction probabilities. 73 Strategic Secrecy in Security Games [IJCAI’17b] Dilemma of Plainclothes commitment strategic secrecy How to explain the frequency use of plainclothes in practice? Strategic Secrecy vs. Commitment deceptive transparent, defender’s private information is revealed Perfect Bayesian Equilibrium (PBE) Nash, simultaneous move Stackelberg, leader’s advantage Computing PBE PBE vs SSE Compute PBEs with special structures zero sum PBE SSE general sum Support set enumeration Theorem: For zero-sum games, PBE is no worse than SSE. Theorem: For certain payoff structures, there exists PBE Mixed Integer no better than Linear SSE. Programming 74 Some Other Recent Works Cyber Security [AAAI’16b,17b, IJCAI’17e] Label Contamination Attack [IJCAI’17c] Protect Elections [IJCAI’16b] Coral Reef [IJCAI’16c], Container [AAMAS’17] 75 Cyber Security for Smart Traffic Control Cyber Attacks E.g., hack the sensors and send fake data to the controller, remotely hack into the controller and take control. Example from Hollywood movies (e.g., The Italian Job) Real-world example Israeli students attacked Waze APP with fake traffic jam in 2014 STRICT: Secure TRaffIc ConTrol Identification, defence Complex system, heterogeneous interaction, dynamic A game theoretic defense mechanism against data poisoning attacks Attacker can poison sensor data A verification based online defense mechanism Optimal escape interdiction on transportation networks [IJCAI’17d] A defender-attacker security game model Dynamically relocate security resources (e.g., police cars) to interdict attacker 76
© Copyright 2026 Paperzz