Overview
Explore game theory concepts and their applications in cybersecurity through this comprehensive conference talk from BSidesLV 2014. Delve into various game types, including Prisoner's Dilemma, Matching Pennies, and Hawk/Dove, while examining strategies, equilibrium, and mind games. Investigate Eric Berne's transactional analysis games, the Badger Game, and trolling techniques. Learn about iterated games, their properties, and societal implications. Gain insights into signaling, peacekeeping, and the role of evolution in game theory. Discover how these strategies can be applied to real-world scenarios in information security and beyond.
Syllabus
Intro
MOTIVATION
OUTLINE
WHAT'S IN A GAME?
A NORMAL FORM GAME
STRATEGIES
PRISONER'S DILEMMA
MATCHING PENNIES
DEADLOCK
STAG HUNT
CHICKEN
HAWK/DOVE
BATTLE OF THE SEXES
WHAT HAVE WE SEEN SO FAR?
EQUILIBRIUM
MIND GAMES
TYPES OF INTERACTIONS
BERNE'S GAMES: STRUCTURE
BERNE'S GAMES: EXAMPLES
THE BADGER GAME
TROLLING
THE SETUP
BOTH SPLIT
ONE SPLITS, ONE STEALS
OBSERVATION
SIGNALING
THE COMPLETE PATH
ITERATED GAMES
PROPERTIES
SOCIETAL ITERATED GAME THEORY
EVOLUTION IS A HARSH MISTRESS
PEACEKEEPING