{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:57:28Z","timestamp":1726055848353},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030324292"},{"type":"electronic","value":"9783030324308"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32430-8_25","type":"book-chapter","created":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T11:11:01Z","timestamp":1572001861000},"page":"417-438","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning"],"prefix":"10.1007","author":[{"given":"Dinuka","family":"Sahabandu","sequence":"first","affiliation":[]},{"given":"Shana","family":"Moothedath","sequence":"additional","affiliation":[]},{"given":"Joey","family":"Allen","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Bushnell","sequence":"additional","affiliation":[]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,23]]},"reference":[{"key":"25_CR1","unstructured":"Alpcan, T., Ba\u015far, T.: An intrusion detection game with limited observations. In: International Symposium on Dynamic Games and Applications (2006)"},{"key":"25_CR2","series-title":"NATO Science Series (Series C: Mathematical and Physical Sciences)","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-94-010-0189-2_30","volume-title":"Stochastic Games and Applications","author":"R Amir","year":"2003","unstructured":"Amir, R.: Stochastic games in economics and related fields: an overview. In: Neyman, A., Sorin, S. (eds.) Stochastic Games and Applications. ASIC, vol. 570, pp. 455\u2013470. Springer, Dordrecht (2003). https:\/\/doi.org\/10.1007\/978-94-010-0189-2_30"},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3390\/fi4040971","volume":"4","author":"B Bencs\u00e1th","year":"2012","unstructured":"Bencs\u00e1th, B., P\u00e9k, G., Butty\u00e1n, L., Felegyhazi, M.: The cousins of Stuxnet: Duqu, Flame, and Gauss. Future Internet 4(4), 971\u20131003 (2012)","journal-title":"Future Internet"},{"issue":"5","key":"25_CR4","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/S0167-6911(97)90015-3","volume":"29","author":"VS Borkar","year":"1997","unstructured":"Borkar, V.S.: Stochastic approximation with two time scales. Syst. Control Lett. 29(5), 291\u2013294 (1997)","journal-title":"Syst. Control Lett."},{"key":"25_CR5","unstructured":"Bowling, M., Veloso, M.: Rational and convergent learning in stochastic games. In: International Joint Conference on Artificial Intelligence, vol. 17, no. 1, pp. 1021\u20131026 (2001)"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Brogi, G., Tong, V.V.T.: TerminAPTor: highlighting advanced persistent threats through information flow tracking. In: IFIP International Conference on New Technologies, Mobility and Security, pp. 1\u20135 (2016)","DOI":"10.1109\/NTMS.2016.7792480"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Clause, J., Li, W., Orso, A.: Dytan: a generic dynamic taint analysis framework. In: International Symposium on Software Testing and Analysis, pp. 196\u2013206 (2007)","DOI":"10.1145\/1273463.1273490"},{"issue":"2","key":"25_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32(2), 1\u20135 (2014)","journal-title":"ACM Trans. Comput. Syst."},{"key":"25_CR9","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier. White paper, Symantec Corp., Security Response, vol. 5, no. 6, p. 29 (2011)"},{"key":"25_CR10","volume-title":"Competitive Markov Decision Processes","author":"J Filar","year":"2012","unstructured":"Filar, J., Vrieze, K.: Competitive Markov Decision Processes. Springer, New York (2012)"},{"key":"25_CR11","unstructured":"Greenwald, A., Hall, K., Serrano, R.: Correlated Q-learning. In: International Conference on Machine Learning (ICML), vol. 3, pp. 242\u2013249 (2003)"},{"key":"25_CR12","first-page":"1039","volume":"4","author":"J Hu","year":"2003","unstructured":"Hu, J., Wellman, M.P.: Nash Q-learning for general-sum stochastic games. J. Mach. Learn. Res. 4, 1039\u20131069 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"2","key":"25_CR13","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/3305218.3305239","volume":"46","author":"L Huang","year":"2019","unstructured":"Huang, L., Zhu, Q.: Adaptive strategic cyber defense for advanced persistent threats in critical infrastructure networks. ACM SIGMETRICS Perform. Eval. Rev. 46(2), 52\u201356 (2019)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"issue":"5","key":"25_CR14","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973\u2013993 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Jee, K., Kemerlis, V.P., Keromytis, A.D., Portokalidis, G.: ShadowReplica: efficient parallelization of dynamic data flow tracking. In: ACM SIGSAC Conference on Computer & Communications Security, pp. 235\u2013246 (2013)","DOI":"10.1145\/2508859.2516704"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Ji, Y., et al.: RAIN: refinable attack investigation with on-demand inter-process information flow tracking. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 377\u2013390 (2017)","DOI":"10.1145\/3133956.3134045"},{"issue":"1\u20132","key":"25_CR17","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10207-004-0060-x","volume":"4","author":"KW Lye","year":"2005","unstructured":"Lye, K.W., Wing, J.M.: Game strategies in network security. Int. J. Inf. Secur. 4(1\u20132), 71\u201386 (2005)","journal-title":"Int. J. Inf. Secur."},{"key":"25_CR18","unstructured":"Moothedath, S., et al.: A game theoretic approach for dynamic information flow tracking to detect multi-stage advanced persistent threats. ArXiv e-prints arXiv:1811.05622 , November 2018"},{"key":"25_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-030-01554-1_5","volume-title":"Decision and Game Theory for Security","author":"S Moothedath","year":"2018","unstructured":"Moothedath, S., Sahabandu, D., Clark, A., Lee, S., Lee, W., Poovendran, R.: Multi-stage dynamic information flow tracking game. In: Bushnell, L., Poovendran, R., Ba\u015far, T. (eds.) GameSec 2018. LNCS, vol. 11199, pp. 80\u2013101. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01554-1_5"},{"key":"25_CR20","unstructured":"Newsome, J., Song, D.: Dynamic taint analysis: automatic detection, analysis, and signature generation of exploit attacks on commodity software. In: Network and Distributed Systems Security Symposium (2005)"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Nguyen, K.C., Alpcan, T., Ba\u015far, T.: Stochastic games for security in networks with interdependent nodes. In: International Conference on Game Theory for Networks, pp. 697\u2013703 (2009)","DOI":"10.1109\/GAMENETS.2009.5137463"},{"issue":"3","key":"25_CR22","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1145\/1353536.1346321","volume":"43","author":"EB Nightingale","year":"2008","unstructured":"Nightingale, E.B., Peek, D., Chen, P.M., Flinn, J.: Parallelizing security checks on commodity hardware. ACM SIGPLAN Not. 43(3), 308\u2013318 (2008)","journal-title":"ACM SIGPLAN Not."},{"key":"25_CR23","unstructured":"Prasad, H., Prashanth, L.A., Bhatnagar, S.: Two-timescale algorithms for learning Nash equilibria in general-sum stochastic games. In: International Conference on Autonomous Agents and Multiagent Systems, pp. 1371\u20131379 (2015)"},{"issue":"3","key":"25_CR24","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1214\/aoms\/1177729586","volume":"22","author":"Herbert Robbins","year":"1951","unstructured":"Robbins, H., Monro, S.: A stochastic approximation method. Ann. Math. Stat. 400\u2013407 (1951)","journal-title":"The Annals of Mathematical Statistics"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Sahabandu, D., et al.: A game theoretic approach for dynamic information flow tracking with conditional branching. In: American Control Conference (ACC) (2019, to appear)","DOI":"10.23919\/ACC.2019.8814596"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Sahabandu, D., Xiao, B., Clark, A., Lee, S., Lee, W., Poovendran, R.: DIFT games: dynamic information flow tracking games for advanced persistent threats. In: IEEE Conference on Decision and Control (CDC), pp. 1136\u20131143 (2018)","DOI":"10.1109\/CDC.2018.8619416"},{"key":"25_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-030-01554-1_28","volume-title":"Decision and Game Theory for Security","author":"MO Sayin","year":"2018","unstructured":"Sayin, M.O., Hosseini, H., Poovendran, R., Ba\u015far, T.: A game theoretical framework for inter-process adversarial intervention detection. In: Bushnell, L., Poovendran, R., Ba\u015far, T. (eds.) GameSec 2018. LNCS, vol. 11199, pp. 486\u2013507. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01554-1_28"},{"issue":"11","key":"25_CR28","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1037187.1024404","volume":"39","author":"GE Suh","year":"2004","unstructured":"Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. ACM SIGPLAN Not. 39(11), 85\u201396 (2004)","journal-title":"ACM SIGPLAN Not."},{"issue":"1","key":"25_CR29","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/BF02810664","volume":"119","author":"N Vieille","year":"2000","unstructured":"Vieille, N.: Two-player stochastic games II: the case of recursive games. Israel J. Math. 119(1), 93\u2013126 (2000)","journal-title":"Israel J. Math."},{"key":"25_CR30","unstructured":"Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross site scripting prevention with dynamic data tainting and static analysis. In: Network & Distributed System Security Symposium, pp. 1\u201312 (2007)"},{"key":"25_CR31","unstructured":"Watkins, B.: The impact of cyber attacks on the private sector, pp. 1\u201311 (2014)"},{"key":"25_CR32","doi-asserted-by":"crossref","unstructured":"Zhu, Q., Ba\u015far, T.: Robust and resilient control design for cyber-physical systems with an application to power systems. In: IEEE Decision and Control and European Control Conference (CDC-ECC), pp. 4066\u20134071 (2011)","DOI":"10.1109\/CDC.2011.6161031"},{"key":"25_CR33","unstructured":"Zhu, Q., Tembine, H., Ba\u015far, T.: Network security configurations: a nonzero-sum stochastic game approach. In: American Control Conference (ACC), pp. 1059\u20131064 (2010)"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32430-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T05:50:59Z","timestamp":1575957059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32430-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030324292","9783030324308"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32430-8_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stockholm","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.gamesec-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}