Game of Decoys - Optimal Decoy Routing Through Game Theory
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a conference talk on optimal decoy routing strategies using game theory, presented at the 23rd ACM Conference on Computer and Communications Security. Delve into the research by Milad Nasr and Amir Houmansadr from UMass Amherst, examining various placement strategies, including central and autonomous deployment. Analyze simulation results, sensor profiles, and decoy budgets, with a specific focus on China's network infrastructure. Gain insights into the game-theoretic approach dubbed "Game of Thrones" and its applications in improving decoy routing techniques for enhanced internet freedom and censorship circumvention.
Syllabus
Intro
Decoy Routing
Paper Introduction
Previous Work
Game of Thrones
Placement Strategies
Central Deployment
Model
Simulation Results
Sensor Profiles
Decoy Budgets
Autonomous Deployment
Decoy Fee
China Analysis
Conclusion
Intuition
Taught by
ACM CCS
Related Courses
Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor BrowserAssociation for Computing Machinery (ACM) via YouTube DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube Identifying the Scan and Attack Infrastructure Behind Amplification DDoS Attacks
Association for Computing Machinery (ACM) via YouTube