2017
DOI: 10.1007/978-3-319-68711-7_23
|View full text |Cite
|
Sign up to set email alerts
|

Information Leakage Games

Abstract: We consider a game-theoretic setting to model the interplay between attacker and defender in the context of information flow, and to reason about their optimal strategies. In contrast with standard game theory, in our games the utility of a mixed strategy is a convex function of the distribution on the defender's pure actions, rather than the expected value of their utilities. Nevertheless, the important properties of game theory, notably the existence of a Nash equilibrium, still hold for our (zero-sum) leaka… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
25
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 21 publications
(27 citation statements)
references
References 33 publications
2
25
0
Order By: Relevance
“…Notable exceptions are the works [4,8,21], which consider attackers who interact with and influence the system, possibly in an adaptive way, with the purpose of maximizing the leakage of information.…”
Section: Example 2 (Dining Cryptographers)mentioning
confidence: 99%
See 4 more Smart Citations
“…Notable exceptions are the works [4,8,21], which consider attackers who interact with and influence the system, possibly in an adaptive way, with the purpose of maximizing the leakage of information.…”
Section: Example 2 (Dining Cryptographers)mentioning
confidence: 99%
“…We consider zero-sum games, in which the gain (for the attacker) is represented by the leakage. While for visible choice it is appropriate to use the "classic" game-theoretic framework, for hidden choice we need to adopt the more general framework of the information leakage games proposed in [4]. This happens because, in contrast with standard game theory, in games with hidden choice the utility of a mixed strategy is a convex function of the distribution on the defender's pure actions, rather than simply the expected value of their utilities.…”
Section: Example 3 (Crime Attack)mentioning
confidence: 99%
See 3 more Smart Citations