Mason Wright

Empirical game-theoretic methods for adaptive cyber-defense

MP Wellman, TH Nguyen, and M Wright in S Jajodia et al. (Eds.): Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, LNCS 11830, pages 112–128, 2019. Abstract Game-theoretic applications in cyber-security are often restricted…
Mason Wright

Deception in Finitely Repeated Security Games

TH Nguyen, Y Wang, A Sinha, and MP Wellman 33rd AAAI Conference on Artificial Intelligence, Jan/Feb 2019. Abstract Allocating resources to defend targets from attack is often complicated by uncertainty about the attacker’s capabilities,…
Mason Wright

A Learning and Masking Approach to Secure Learning

L Nguyen, S Wang, and A Sinha Ninth Conference on Decision and Game Theory for Security, October 2018. Abstract Deep Neural Networks (DNNs) have been shown to be vulnerable against adversarial examples, which are data points cleverly constructed…
Mason Wright

Stackelberg Security Games: Looking Beyond a Decade of Success

A Sinha, F Fang, B An, C Kiekintveld, and M Tambe 27th International Joint Conference on Artificial Intelligence, July 2018. Abstract The Stackelberg Security Game (SSG) model has been immensely influential in security research since it…
Mason Wright
, , , ,

Mason Wright Defends Thesis Proposal

Mason Wright successfully defended his thesis proposal last week: Stable Profiles in Simulation-Based Games via Reinforcement Learning and Statistics. Congratulations, Mason.
Mason Wright

Multi-stage attack graph security games: Heuristic strategies, with empirical game-theoretic analysis

TH Nguyen, M Wright, MP Wellman, and S Singh Security and Communication Networks, Article ID 2864873, 28 pages, 2018. Extended version of a paper presented at the Fourth ACM Workshop on Moving Target Defense, Oct 2017. Abstract We study…
Mason Wright

A Stackelberg game model for botnet data exfilitration

TH Nguyen, MP Wellman, and S Singh 8th Conference on Decision and Game Theory for Security (GameSec), pages 151–170, Oct 2017. Abstract Cyber-criminals can distribute malware to control computers on a networked system and leverage these…
Mason Wright

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation

G Cybenko, S Jajodia, MP Wellman, and P Liu In: Prakash A., Shyamasundar R. (eds) Information Systems Security. ICISS 2014. Lecture Notes in Computer Science, vol 8880. Springer. Abstract Today’s cyber defenses are largely static. They…
Mason Wright

SoK: Security and Privacy in Machine Learning

N Papernot, P McDaniel, A Sinha, and MP Wellman Third IEEE European Symposium on Security and Privacy, April 2018. Abstract Advances in machine learning (ML) in recent years have enabled a dizzying array of applications such as data analytics,…
Mason Wright

A Moving Target Defense Approach to Mitigate DDoS Attacks against Proxy-Based Architectures

S Venkatesan, M Albanese, K Amin, S Jajodia, and M Wright IEEE Conference on Communications and Network Security, Oct 2016. Abstract Distributed Denial of Service attacks against high-profile targets have become more frequent in recent…