Living with Continual Failure Ronald L. Rivest Viterbi Professor of - - PowerPoint PPT Presentation

living with continual failure
SMART_READER_LITE
LIVE PREVIEW

Living with Continual Failure Ronald L. Rivest Viterbi Professor of - - PowerPoint PPT Presentation

Living with Continual Failure Ronald L. Rivest Viterbi Professor of EECS MIT, Cambridge, MA Michael Rabin Celebration 2011-08-29 1 Living with Continual Failure Ronald L. Rivest Viterbi Professor of EECS MIT, Cambridge, MA Michael Rabin


slide-1
SLIDE 1

Living with Continual Failure

Ronald L. Rivest

Viterbi Professor of EECS MIT, Cambridge, MA

Michael Rabin Celebration 2011-08-29

1

slide-2
SLIDE 2

Living with Continual Failure

Ronald L. Rivest

Viterbi Professor of EECS MIT, Cambridge, MA

Michael Rabin Celebration 2011-08-29

2

slide-3
SLIDE 3

Living with Continual Failure

Ronald L. Rivest

Viterbi Professor of EECS MIT, Cambridge, MA

Michael Rabin Celebration 2011-08-29

3

slide-4
SLIDE 4

Happy Birthday, Michael!!

4

slide-5
SLIDE 5

Outline

Overview and Context The Game of “FLIPIT” Non-Adaptive Play Adaptive Play Lessons and Open Questions

5

slide-6
SLIDE 6

Cryptography Cryptography is mostly about using mathematics and secrets to achieve confidentiality, integrity, or other security

  • bjectives.

6

slide-7
SLIDE 7

Assumptions We make assumptions as necessary, such as ability of parties to generate unpredictable keys and to keep them secret, or inability of adversary to perform certain computations.

7

slide-8
SLIDE 8

Murphy’s Law: “If anything can go wrong, it will!”

8

slide-9
SLIDE 9

Assumptions may fail, badly. (Maginot Line)

9

slide-10
SLIDE 10

Even worse... In an adversarial situation, assumption may fail repeatedly... (ref Advanced Persistent Threats)

10

slide-11
SLIDE 11

Most crypto is like Maginot line... We work hard to make up good keys and distribute them properly, then we sit back and wait for the attack. There is a line we assume adversary can not cross (theft of keys).

11

slide-12
SLIDE 12

Partial key theft Much research allows adversary to steal some portion of key(s).

◮ secret-sharing [S79,...] ◮ proactive crypto [HJKY95,...] ◮ signer-base intrusion-resilience [IR04,...] ◮ leakage-resilient crypto [MR04,...]

But adversary isn’t allowed to steal everything, all at once. (Some exceptions, e.g. intrusion-resilient secure channels [IMR’05]) This just moves the line in the digital sand a bit...

12

slide-13
SLIDE 13

Total key loss To be a good security professional, there shouldn’t be limits on your paranoia! (The adversary won’t respect such limits...) Are we being sufficiently paranoid??

13

slide-14
SLIDE 14

Lincoln’s Riddle

Q: “If I call the dog’s tail a leg, how many legs does it have?”

14

slide-15
SLIDE 15

Lincoln’s Riddle

Q: “If I call the dog’s tail a leg, how many legs does it have?” A: “Four. It doesn’t matter what you call the tail; it is still a tail.”

15

slide-16
SLIDE 16

Corollary to Lincoln’s Riddle Calling a bit-string a “secret key” doesn’t actually make it secret...

16

slide-17
SLIDE 17

Corollary to Lincoln’s Riddle Calling a bit-string a “secret key” doesn’t actually make it secret... Rather, it just identifies it as an interesting target for the adversary!

17

slide-18
SLIDE 18

Our goal To develop new models for scenarios involving total key loss. Especially those scenarios where theft is stealthy or covert (not immediately noticed by good guys).

18

slide-19
SLIDE 19

FL I PIT The Game of “FL I PIT” (aka “Stealthy Takeover”) joint work with Ari Juels, Alina Oprea, Marten van Dijk

  • f RSA Labs

19

slide-20
SLIDE 20

FL I PIT is a two-player game Defender = Player 0 = Blue Attacker = Player 1 = Red

20

slide-21
SLIDE 21

FL I PIT is a two-player game Defender = Player 0 = Blue Attacker = Player 1 = Red FL I PIT is rather symmetric, and we say “player i ” to refer to an arbitrary player.

21

slide-22
SLIDE 22

There is a contested critical secret or resource

22

slide-23
SLIDE 23

There is a contested critical secret or resource Examples:

◮ A password

23

slide-24
SLIDE 24

There is a contested critical secret or resource Examples:

◮ A password ◮ A digital signature key

24

slide-25
SLIDE 25

There is a contested critical secret or resource Examples:

◮ A password ◮ A digital signature key ◮ A computer system

25

slide-26
SLIDE 26

There is a contested critical secret or resource Examples:

◮ A password ◮ A digital signature key ◮ A computer system ◮ A mountain pass

26

slide-27
SLIDE 27

State of secret or resource is binary Good | Bad

27

slide-28
SLIDE 28

State of secret or resource is binary Good | Bad Secret | Guessed or Stolen

28

slide-29
SLIDE 29

State of secret or resource is binary Good | Bad Secret | Guessed or Stolen Clean | Compromised

29

slide-30
SLIDE 30

State of secret or resource is binary Good | Bad Secret | Guessed or Stolen Clean | Compromised Controlled by Defender | Controlled by Attacker

30

slide-31
SLIDE 31

State of secret or resource is binary Good | Bad Secret | Guessed or Stolen Clean | Compromised Controlled by Defender | Controlled by Attacker Blue | Red

31

slide-32
SLIDE 32

A player can “move” (take control) at any time Defender move puts resource into Good state

32

slide-33
SLIDE 33

A player can “move” (take control) at any time Defender move puts resource into Good state = Initialize Reset Recover Disinfect

33

slide-34
SLIDE 34

A player can “move” (take control) at any time Defender move puts resource into Good state = Initialize Reset Recover Disinfect Attacker move puts resource into Bad state

34

slide-35
SLIDE 35

A player can “move” (take control) at any time Defender move puts resource into Good state = Initialize Reset Recover Disinfect Attacker move puts resource into Bad state = Compromise Corrupt Steal Infect

35

slide-36
SLIDE 36

A player can “move” (take control) at any time Defender move puts resource into Good state = Initialize Reset Recover Disinfect Attacker move puts resource into Bad state = Compromise Corrupt Steal Infect Time is continuous, not discrete.

36

slide-37
SLIDE 37

A player can “move” (take control) at any time Defender move puts resource into Good state = Initialize Reset Recover Disinfect Attacker move puts resource into Bad state = Compromise Corrupt Steal Infect Time is continuous, not discrete. Players move at same time with probability 0.

37

slide-38
SLIDE 38

Examples of moves: Create new password or signing key. Steal password or signing key.

38

slide-39
SLIDE 39

Examples of moves: Create new password or signing key. Steal password or signing key. Re-install system software. Use zero-day attack to install rootkit.

39

slide-40
SLIDE 40

Examples of moves: Create new password or signing key. Steal password or signing key. Re-install system software. Use zero-day attack to install rootkit. Send soldiers to mountain pass. Send soldiers to mountain pass.

40

slide-41
SLIDE 41

Continual back-and-forth warfare...

◮ Note that Attacker can take over at any time.

41

slide-42
SLIDE 42

Continual back-and-forth warfare...

◮ Note that Attacker can take over at any time. ◮ There is no “perfect defense”.

42

slide-43
SLIDE 43

Continual back-and-forth warfare...

◮ Note that Attacker can take over at any time. ◮ There is no “perfect defense”. ◮ Only option for Defender is to re-take control

later by moving again.

43

slide-44
SLIDE 44

Continual back-and-forth warfare...

◮ Note that Attacker can take over at any time. ◮ There is no “perfect defense”. ◮ Only option for Defender is to re-take control

later by moving again.

◮ The game may go on forever...

44

slide-45
SLIDE 45

Moves are “stealthy”

◮ In practice, compromise is often

undetected...

45

slide-46
SLIDE 46

Moves are “stealthy”

◮ In practice, compromise is often

undetected...

◮ In FL I PIT,

players do not immediately know when the

  • ther player makes a move!

(Very unusual in game theory literature!)

46

slide-47
SLIDE 47

Moves are “stealthy”

◮ In practice, compromise is often

undetected...

◮ In FL I PIT,

players do not immediately know when the

  • ther player makes a move!

(Very unusual in game theory literature!)

◮ Player’s uncertainty about system state

increases with time since his last move.

47

slide-48
SLIDE 48

Moves are “stealthy”

◮ In practice, compromise is often

undetected...

◮ In FL I PIT,

players do not immediately know when the

  • ther player makes a move!

(Very unusual in game theory literature!)

◮ Player’s uncertainty about system state

increases with time since his last move.

◮ A move may take control (“flip”) or have no

effect (“flop”).

48

slide-49
SLIDE 49

Moves are “stealthy”

◮ In practice, compromise is often

undetected...

◮ In FL I PIT,

players do not immediately know when the

  • ther player makes a move!

(Very unusual in game theory literature!)

◮ Player’s uncertainty about system state

increases with time since his last move.

◮ A move may take control (“flip”) or have no

effect (“flop”).

◮ Uncertainty means flops are unavoidable.

49

slide-50
SLIDE 50

Moves may be informative

◮ A player learns the state of the system only

when he moves.

50

slide-51
SLIDE 51

Moves may be informative

◮ A player learns the state of the system only

when he moves.

◮ In basic FL I PIT, each move has feedback

that reveals all previous moves.

51

slide-52
SLIDE 52

Moves may be informative

◮ A player learns the state of the system only

when he moves.

◮ In basic FL I PIT, each move has feedback

that reveals all previous moves.

◮ In variants, move reveals only current state,

  • r time since other player last moved...

52

slide-53
SLIDE 53

Cost of moves and gains for being in control

◮ Moves aren’t for free!

53

slide-54
SLIDE 54

Cost of moves and gains for being in control

◮ Moves aren’t for free! ◮ Player i pays ki points per move:

Defender pays k0, Attacker pays k1

54

slide-55
SLIDE 55

Cost of moves and gains for being in control

◮ Moves aren’t for free! ◮ Player i pays ki points per move:

Defender pays k0, Attacker pays k1

◮ Being in control yields gain!

55

slide-56
SLIDE 56

Cost of moves and gains for being in control

◮ Moves aren’t for free! ◮ Player i pays ki points per move:

Defender pays k0, Attacker pays k1

◮ Being in control yields gain! ◮ Player earns one point for each second he is

in control.

56

slide-57
SLIDE 57

How well are you playing? (Notation)

◮ Let Ni(t) denote number moves by player i

up to time t. His average rate of play is αi(t) = Ni(t)/t .

57

slide-58
SLIDE 58

How well are you playing? (Notation)

◮ Let Ni(t) denote number moves by player i

up to time t. His average rate of play is αi(t) = Ni(t)/t .

◮ Let Gi(t) denote the number of seconds

player i is in control, up to time t. His rate of gain up to time t is γi(t) = Gi(t)/t .

58

slide-59
SLIDE 59

How well are you playing? (Notation)

◮ Score (net benefit) Bi(t) up to time t is

TimeInControl - CostOfMoves: Bi(t) = Gi(t) − ki · Ni(t)

◮ Benefit rate is

βi(t) = Bi(t)/t = γi(t) − ki · αi(t)

◮ Player wishes to maximize βi = limt→∞ βi(t).

59

slide-60
SLIDE 60

Movie of FL I PIT Game – Global View

60

slide-61
SLIDE 61

Movie of FL I PIT Game – Defender View

61

slide-62
SLIDE 62

How to play well?

62

slide-63
SLIDE 63

Non-Adaptive Play

63

slide-64
SLIDE 64

Non-adaptive strategies

◮ A non-adaptive strategy plays on blindly,

independent of other player’s moves.

64

slide-65
SLIDE 65

Non-adaptive strategies

◮ A non-adaptive strategy plays on blindly,

independent of other player’s moves.

◮ In principle, a non-adaptive player can

pre-compute his entire (infinite!) list of moves before the game starts.

65

slide-66
SLIDE 66

Non-adaptive strategies

◮ A non-adaptive strategy plays on blindly,

independent of other player’s moves.

◮ In principle, a non-adaptive player can

pre-compute his entire (infinite!) list of moves before the game starts.

◮ Some interesting non-adaptive strategies:

66

slide-67
SLIDE 67

Non-adaptive strategies

◮ A non-adaptive strategy plays on blindly,

independent of other player’s moves.

◮ In principle, a non-adaptive player can

pre-compute his entire (infinite!) list of moves before the game starts.

◮ Some interesting non-adaptive strategies:

◮ Periodic play 67

slide-68
SLIDE 68

Non-adaptive strategies

◮ A non-adaptive strategy plays on blindly,

independent of other player’s moves.

◮ In principle, a non-adaptive player can

pre-compute his entire (infinite!) list of moves before the game starts.

◮ Some interesting non-adaptive strategies:

◮ Periodic play ◮ Exponential (memoryless) play 68

slide-69
SLIDE 69

Non-adaptive strategies

◮ A non-adaptive strategy plays on blindly,

independent of other player’s moves.

◮ In principle, a non-adaptive player can

pre-compute his entire (infinite!) list of moves before the game starts.

◮ Some interesting non-adaptive strategies:

◮ Periodic play ◮ Exponential (memoryless) play ◮ Renewal strategies: iid intermove times 69

slide-70
SLIDE 70

Periodic play Player i may play periodically with rate αi and period 1/αi

70

slide-71
SLIDE 71

Periodic play Player i may play periodically with rate αi and period 1/αi E.g. for α0 = 1/3, we might have: t

71

slide-72
SLIDE 72

Periodic play Player i may play periodically with rate αi and period 1/αi E.g. for α0 = 1/3, we might have: t It is convenient to assume that periodic play involves miniscule amounts of jitter or drift; play is effectively periodic but will drift out of phase with truly periodic.

72

slide-73
SLIDE 73

Adaptive play against a periodic opponent An adaptive Attacker can easily learn the period and phase of a periodic Defender, so that periodic play is useless against an adaptive

  • pponent, unless it is very fast.

Examples:

◮ a sentry makes his regular rounds ◮ 90-day password reset

73

slide-74
SLIDE 74

Periodic Attacker

Theorem

If Attacker moves periodically at rate α1 (and period 1/α1, with unknown phase), then

  • ptimum non-adaptive Defender strategy is

◮ if α1 >

1 2k0, don’t play(!),

◮ if α1 =

1 2k0, play periodically at any rate α0,

0 ≤ α0 ≤

1 2k0,

◮ if α1 <

1 2k0, play periodically at rate

α0 = α1 2k0 > α1

74

slide-75
SLIDE 75

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

slide-76
SLIDE 76

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

slide-77
SLIDE 77

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

if α1 >

1 2k0 Attacker too fast for Defender

slide-78
SLIDE 78

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

slide-79
SLIDE 79

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

if α1 =

1 2k0

Defender can play with 0 benefit

slide-80
SLIDE 80

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

slide-81
SLIDE 81

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

if α1 <

1 2k0

Defender maximizes benefit with α0 =

  • α1

2k0

slide-82
SLIDE 82

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

Optimal Attacker play

slide-83
SLIDE 83

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

Optimal Attacker play

slide-84
SLIDE 84

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

Optimal Attacker play

slide-85
SLIDE 85

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

Optimal Attacker play

slide-86
SLIDE 86

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

Nash equilibrium at (α0, α1) = ( 1

3, 2 9)

slide-87
SLIDE 87

Graph for Periodic Attacker and Periodic Defender

(k0 = 1, k1 = 1.5)

α0

2 3 1 2 1 3 1 6

α1

2 3 1 2 1 3 1 6

Nash equilibrium at (α0, α1) = ( 1

3, 2 9)

(γ0, γ1) = ( 2

3, 1 3)

(β0, β1) = ( 1

3, 0)

87

slide-88
SLIDE 88

Exponential Attacker If Attacker plays exponentially with rate α1, then his moves form a memoryless Poisson process; he plays independently in each interval of time

  • f size dt with probability α1 dt

Probability that intermove delay is at most x is 1 − e−α1x For α1 = 0.5, we might have: t

88

slide-89
SLIDE 89

Graph for Exponential Attacker and Defender)

(k0 = 1, k1 = 1.5)

α0

1

2 3 1 3

α1

1

2 3 1 3

slide-90
SLIDE 90

Graph for Exponential Attacker and Defender)

(k0 = 1, k1 = 1.5)

α0

1

2 3 1 3

α1

1

2 3 1 3

slide-91
SLIDE 91

Graph for Exponential Attacker and Defender)

(k0 = 1, k1 = 1.5)

α0

1

2 3 1 3

α1

1

2 3 1 3

Attacker too fast if α1 > 1

slide-92
SLIDE 92

Graph for Exponential Attacker and Defender)

(k0 = 1, k1 = 1.5)

α0

1

2 3 1 3

α1

1

2 3 1 3

slide-93
SLIDE 93

Graph for Exponential Attacker and Defender)

(k0 = 1, k1 = 1.5)

α0

1

2 3 1 3

α1

1

2 3 1 3

Optimal Defender play for α1 < 1 α0 =

  • α1

k0 − α1

slide-94
SLIDE 94

Graph for Exponential Attacker and Defender)

(k0 = 1, k1 = 1.5)

α0

1

2 3 1 3

α1

1

2 3 1 3

Optimal Attacker play

slide-95
SLIDE 95

Graph for Exponential Attacker and Defender)

(k0 = 1, k1 = 1.5)

α0

1

2 3 1 3

α1

1

2 3 1 3

Optimal Attacker play

slide-96
SLIDE 96

Graph for Exponential Attacker and Defender)

(k0 = 1, k1 = 1.5)

α0

1

2 3 1 3

α1

1

2 3 1 3

Nash equilibrium at (α0, α1) = ( 6

25, 4 25)

slide-97
SLIDE 97

Graph for Exponential Attacker and Defender)

(k0 = 1, k1 = 1.5)

α0

1

2 3 1 3

α1

1

2 3 1 3

Nash equilibrium at (α0, α1) = ( 6

25, 4 25)

(γ0, γ1) = ( 3

5, 2 5)

(β0, β1) = ( 9

25, 6 25)

97

slide-98
SLIDE 98

Renewal Strategies A renewal strategy is non-adaptive with iid intermove delays for player i’s moves: Pr(delay ≤ x) = Fi(x) for some distribution Fi. Renewal strategies are a large class; periodic, exponential, etc. are special cases... Origin of term: player’s moves form a renewal process.

98

slide-99
SLIDE 99

Optimal (renewal) play against a renewal strategy. One of our major results is the following:

Theorem

The optimal renewal strategy against any renewal strategy is either periodic or not playing.

99

slide-100
SLIDE 100

Proof notes Average time between buses = Average waiting time for a bus

100

slide-101
SLIDE 101

Proof notes Average time between buses = Average waiting time for a bus Proof considers size-biased interval sizes...

101

slide-102
SLIDE 102

Proof notes Average time between buses = Average waiting time for a bus Proof considers size-biased interval sizes... Note that a periodic strategy minimizes variance

  • f interval sizes, and thus minimizes size-biased

interval size.

102

slide-103
SLIDE 103

Adaptive Play

103

slide-104
SLIDE 104

Adaptive Strategies

◮ Periodic strategy not very effective against

adaptive Attacker, who can learn to move just after each Defender move.

104

slide-105
SLIDE 105

Adaptive Strategies

◮ Periodic strategy not very effective against

adaptive Attacker, who can learn to move just after each Defender move.

◮ FL I PIT with adaptive strategies can be

complicated – generalizes iterated Prisoner’s Dilemma—e.g. for periodic play:

105

slide-106
SLIDE 106

Adaptive Strategies

◮ Periodic strategy not very effective against

adaptive Attacker, who can learn to move just after each Defender move.

◮ FL I PIT with adaptive strategies can be

complicated – generalizes iterated Prisoner’s Dilemma—e.g. for periodic play: slow(α1 = 0.1) fast(α1 = 0.2) slow(α0 = 0.1) 0.40,0.40

  • 0.10,0.55

fast(α0 = 0.2) 0.55,-0.10 0.30,0.30

106

slide-107
SLIDE 107

Exponential works well even against adaptive strategies

Theorem

The optimal strategy (of any sort, even adaptive) against an exponential strategy is either periodic

  • r not playing.

Defender can always play exponential strategy against a potentially adaptive Attacker; Attacker can’t then do better than playing periodically (or not playing).

107

slide-108
SLIDE 108

Defender’s (α0 = 0.25) net benefit β0 against optimal (periodic) Attacker (α1variable) α1

2 3 1 3

β0

2 3 1 3

Periodic Attacker Periodic Defender

slide-109
SLIDE 109

Defender’s (α0 = 0.25) net benefit β0 against optimal (adaptive) Attacker (α1variable) α1

2 3 1 3

β0

2 3 1 3

Periodic Attacker Periodic Defender

Adaptive Attacker Exponential Defender

slide-110
SLIDE 110

Defender’s (α0 = 0.25) net benefit β0 against optimal (adaptive) Attacker (α1variable) α1

2 3 1 3

β0

2 3 1 3

Periodic Attacker Periodic Defender

Adaptive Attacker Exponential Defender ∃ ? Better Defender ?

110

slide-111
SLIDE 111

Lessons and Open Questions

111

slide-112
SLIDE 112

Lessons

◮ Be prepared to deal with repeated total

failure (loss of control).

112

slide-113
SLIDE 113

Lessons

◮ Be prepared to deal with repeated total

failure (loss of control).

◮ Play fast! Aim to make opponent drop out!

(Agility!) (Reboot server frequently; change password

  • ften)

113

slide-114
SLIDE 114

Lessons

◮ Be prepared to deal with repeated total

failure (loss of control).

◮ Play fast! Aim to make opponent drop out!

(Agility!) (Reboot server frequently; change password

  • ften)

◮ Arrange game so that your moves cost much

less than your opponent’s! (Cheap to refresh passwords or keys, easy to reset system to pristine state (as with a virtual machine))

114

slide-115
SLIDE 115

Open question 1 Conjecture: The optimal non-adaptive strategy against a renewal strategy is periodic. (We proved only that optimal renewal strategy is periodic; not every non-adaptive strategy is a renewal strategy.)

115

slide-116
SLIDE 116

Open question 2 What is “optimal” renewal strategy against an adaptive rate-limited Attacker? (e.g. N1(t)/t ≤ α1 for all t)?

116

slide-117
SLIDE 117

Open question 2 What is “optimal” renewal strategy against an adaptive rate-limited Attacker? (e.g. N1(t)/t ≤ α1 for all t)? That is, how to balance trade-off between periodic play, which has low-variance intervals but is predictable, and exponential, which has high-variance intervals but is very unpredictable? Perhaps using gamma-distributed intervals or delayed exponentials?

117

slide-118
SLIDE 118

Open question 3 Are there information-theoretic bounds on how well a rate-limited Attacker can do against a fixed renewal strategy by Defender?

118

slide-119
SLIDE 119

Open question 4 What learning theory algorithms yield adaptive strategies provably optimal against renewal strategies?

119

slide-120
SLIDE 120

Open questions 5, 6, 7, ... 5 Multi-player FL I PIT 6 Other feedback models (e.g. add low-cost “check”) 7 How to structure PKI when any party (including CA’s) may get “hacked” at any time? ... ...

120

slide-121
SLIDE 121

Online version of FL I PIT More information on FL I PIT, including an

  • nline interactive version of the game, will be

available in the next few weeks at: www.rsa.com/flipit Enjoy!

121

slide-122
SLIDE 122

The End

122