GameSec 2024

Conference on Game Theory and AI for Security

October 16-18, 2024, New York, USA

2024 Conference on Game Theory and AI for Security

Thank you to all participants in GameSec 2024! See you next year!

Photo: Participants Photo: Participants Photo: Participants

Best-paper awards

Based on the evaluation from the program committee members, the organization committee selected the following best papers:

  • Roshan Lal Neupane, Bishnu Bhusal, Kiran Neupane, Preyea Regmi, Tam Dinh, Lilliana Marrero, Sayed M. Saghaian N. E., Venkata Sriram Siddhardh Nadendla, and Prasad Calyam. On Countering Ransomware Attacks using Strategic Deception
  • Photo: Participants



  • Jakub Cerny, Chun Kai Ling, Darshan Chakrabarti, Jingwen Zhang, Gabriele Farina, Christian Kroer, and Garud Iyengar. Contested Logistics: A Game Theoretic Approach

  • Yunfei Ge and Quanyan Zhu. MEGA-PT: A Meta-Game Framework for Agile Penetration Testing
  • Photo: Participants



General Description

The 15th Conference on Game Theory and AI for Security (GameSec-24) will take place from October 16-18, 2024 in New York, USA. With the rapid development of information, automation, and communication technology, the security of these emerging systems is more important now than ever. GameSec 2024 focuses on protecting heterogeneous, large-scale, and dynamic cyber-physical systems and managing security risks faced by critical infrastructures through rigorous and practically relevant analytical methods. GameSec 2024 invites novel, high-quality theoretical and empirical contributions, which leverage decision theory and game theory to address security problems and related problems such as privacy, trust, or bias in emerging systems. The goal of the conference is to bring together academic, government, and industrial researchers in an effort to identify and discuss the major challenges and recent results that highlight the interdisciplinary connections between game theory, AI, control, distributed optimization, adversarial reasoning, machine learning, mechanism design, behavioral analysis, risk assessments, and security, reputation, trust and privacy problems.

The conference encourages paper submission on applications of large foundation models in AI, including LLMs, to security and privacy problems as well as adversarial attacks on such models or limitations of such models in complex security domains.

Conference Topics include (but are not restricted to):

GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics:

  • Applications of game theory in security, encompassing both cooperative and non-cooperative games
  • Mechanism design for enhancing security and privacy protocols.
  • Deception and signaling techniques in security.
  • Security investment strategies and economic considerations.
  • Utilization of control theory principles for autonomous defense.
  • Integration of reinforcement learning techniques into cybersecurity measures.
  • Implementation and implications of cyber insurance policies within security strategies.
  • Techniques for risk assessment and effective risk management
  • Trust evaluation and management methodologies.
  • Integration of behavioral aspects into security and privacy frameworks.
  • Incorporating insights from behavioral sciences into decision-making within security contexts.
  • Applications of machine learning in security.
  • Exploration of adversarial and trustworthy machine learning techniques including in foundation models.
  • Strategic utilization of machine learning for cybersecurity.
  • Implementation of multi-agent learning approaches in security contexts.
  • Use of foundation models in security.

Keynote Speakers

We are happy to announce the following keynote speakers:

David_Nicol
David M. Nicol

Title: Uncertainty in Security Analysis

Abstract:

Models are extensively used in the security analysis of computer systems. These models typically require information about the device, their interconnections, services offered, and configuration. They include assumptions about an attacker and the defender, and sometimes assumptions about the operating environment. The problem is that in practice the information one has about the model and the model parameters is incomplete with fidelity that is lacking or uncertain. This talk reviews our work in developing techniques for expressing uncertainty, and for assessing uncertainty in the model output. We focus in particular on uncertainty quantification around the adversary's ability to reach a critical asset in a protected network.

Bio:

David M. Nicol holds the Herman M. Dieckamp Endowed Chair in Engineering at the University of Illinois Urbana-Champaign. He is a member of the Department of Electrical and Computer Engineering, and since 2012 has served as the Director of the Information Trust Institute.

Prof. Nicol’s research include risk assessment of networks and software and scalable virtualized testbeds, research which has led to the founding of startup company Network Perception, and election as Fellow of the IEEE and Fellow of the ACM. He is the inaugural recipient of the ACM SIGSIM Outstanding Contributions award, and co‐author of the widely used undergraduate textbook “Discrete‐Event Systems Simulation”. He holds two patents in cyber-security assessment technologies.



Gonzalez
Cleotilde (Coty) Gonzalez

Title: Leveraging Human Decision Making Models for Autonomous Cyber Defense

Abstract:

Humans play a critical role in cyber defense—end users remain vulnerable to phishing, defenders strive to detect unauthorized intrusions, and attackers constantly innovate to exploit both groups. Unfortunately, attackers often succeed. How can insights from human decision-making research enhance autonomous cyber defenses? This question has driven my research for over a decade. Historically, Artificial Intelligence (AI) sought to replicate human behavior, and in this talk, I will explore our approach to this challenge. Through games, testbeds, and cognitive computational models that aim at replicating human behavior, we have examined how human behaviors can inform cyber defense strategies, particularly in cyber deception. I will present evidence that algorithms incorporating attackers’ cognitive biases outperform theoretically optimal strategies and demonstrate how these cognitive models can function as human partners within cyber defense teams.

Bio:

Cleotilde (Coty) Gonzalez is a Research Professor at the Department of Social and Decision Sciences at Carnegie Mellon University. Her research work focuses on the study of human decision making in dynamic and complex environments. She is the founding director of the Dynamic Decision Making Laboratory where researchers conduct behavioral studies on dynamic decision making using Decision Making Games, and create technologies and cognitive computational models to support decision making and training.

Coty is affiliated faculty with the CyLab Security and Privacy Institute, The HCII Human-Computer Interaction Institute, The Societal Computing program, and The CNBC Center for Neural Basis of Cognition at Carnegie Mellon University. She is a lifetime fellow of the Cognitive Science Society and of the Human Factors and Ergonomics Society. She is also a member of the Governing Board of the Cognitive Science Society. She is a Senior Editor for Topics in Cognitive Science, a Consulting Editor for Decision, and Associate Editor for the System Dynamics Review. She is also a member of editorial boards in multiple other journals including: Cognitive Science, Psychological Review, Perspectives on Psychological Science, and others.

Coty has published hundreds of papers in journals and peer-reviewed proceedings involving a diverse set of fields deriving from her contributions to Cognitive Science. Her work includes the development of a theory of decisions from experience called Instance-Based Learning Theory (IBLT), from which many computational models have emerged in areas as diverse as: cybersecurity, network science, human-machine teaming, and others. She has been Principal or Co-Investigator on a wide range of multi-million and multi-year collaborative efforts with government and industry, including current efforts on Collaborative Research Alliances; Multi-University Research Initiative grants from the Army Research Laboratories and Army Research Office; and large collaborative projects with the Defense Advanced Research Projects Agency (DARPA).

Conference Sponsors and Supporters

We invite you to participate in the sponsor program for GameSec-24. The conference will be held in person October 16-18, 2024. GameSec is an annual international conference that started in 2010 and it focuses on the protection of heterogeneous, large-scale, and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically relevant analytical methods, especially game-theoretic and decision-theoretic methods. The proceedings of the conference are published by Springer.

GameSec conference attracts 25-50 students, researchers, and practitioners every year from all around the world. Your participation in the GameSec sponsor program will give you visibility to this diverse group that has interest and expertise in security, privacy, game theory, decision theory, and more.

Sponsor benefits include:

  • Sponsor company name and logo will be displayed on website and at the venue
  • Opportunity for sponsored awards (best paper and best paper honorable mention)
  • Opportunity to provide named travel grant
  • Acknowledgment in opening talk and closing remarks
    • New York University
      NYU
    • Springer (Best Paper Award)
      Springer

Code of Conduct

The GameSec community values Diversity, Equity, and Inclusion (DEI). GameSec’s Code of Conduct clearly outlines undesirable behaviors and subsequent corrective actions in detail.

GameSec 2024 Proceedings

GameSec 2024 proceedings are published here by Springer as part of the LNCS series.