Incidents Elie Bursztein and Jean Goubault Larrecq

Size: px
Start display at page:

Download "Incidents Elie Bursztein and Jean Goubault Larrecq"

Transcription

1 A Logical Framework for Anticipation of Network Incidents and Jean Goubault Larrecq PhdStudent LSV ENS CACHAN CNRS INRIA DGA

2 Outline Introduction Network Evolution Attack Model Evolution Anticipation game key features Dependency relations Player interaction Time Model Logic Positional Logic Temporal Logic Conclusion Outline: Introduction > Model > Strategy > Conclusion 2

3 The Good Old Time Outline: Introduction > Model > Strategy > Conclusion 3

4 The Current Internet Opte project Outline: Introduction > Model > Strategy > Conclusion 4

5 Attack Sophistication vs. Intruder Knowledge Cert/ Carnegie Mellon University Outline: Introduction > Model > Strategy > Conclusion 5

6 Attack Step stones Large network may suffers multiples l vulnerabilities Patches and counter measures need to be prioritized A minor vulnerability can turn into a major hole when used as a step stone Attack graph allows to reason about attack sequences Outline: Introduction > Model > Strategy > Conclusion 6

7 Attack Graph Example Sandia Red Team White Board attack graph from DARPA CC20008 Information battle space preparation experiment Outline: Introduction > Model > Strategy > Conclusion 7

8 Model Evolution Attack graphs model checker (Ritchey and Ammann 2000) Anticipation Games Attack trees (Schneier 1999) Outline: Introduction > Model > Strategy > Conclusion 8

9 Attack graph Related Work Model checker based (Ritchey et. al S&P 00, Sheyner et. al S&P 02) Graph based (Ammann et. alccs 02,Ritchey et. al ACSAC 02, Noel et. al ACSAC 03, Wang et. al ESORICS 05,Wang et. al DBSEC 06) Timed Game ATL (Alur et al. 97) The Element of Surprise in Timed Games (De Alfaro et al. CONCUR 2003) TATL (Henzinger et al 2006 Formats) Outline: Introduction > Model > Strategy > Conclusion 9

10 Model Key Features Dependency Collateral effects Trust relations Interaction Administrator Intruder Time Action take time Outline: Introduction > Model > Strategy > Conclusion 10

11 Dependency User Database server Web server Client 1 Client 2 Client 3 Outline: Introduction > Model > Strategy > Conclusion 11

12 Network interaction Exploit vulnerabilities Abuse trust relations Patch Firewall Restore Outline: Introduction > Model > Strategy > Conclusion 12

13 Vulnerability cycle Cert/ Carnegie Mellon University Outline: Introduction > Model > Strategy > Conclusion 13

14 Network Information Fixed over the time Evolve over time Web server User Database Dtb server ρ(public) T T ρ(vuln) T T ρ(compr) ρ(needpub) T T Client 1 Client 2 Client 3 Outline: Introduction > Model > Strategy > Conclusion 14

15 Information Evolution ρ(public) T T Compr 4 ρ(public) T T ρ(vuln) T T ρ(vuln) T T ρ(compr) ρ(compr) T ρ(needpu ρ(needpu T T b) b) T T Outline: Introduction > Model > Strategy > Conclusion 15

16 A Incomplete Game Example Exploit web server Patch server Exploit server Patch web server Patch server Outline: Introduction > Model > Strategy > Conclusion 16

17 Time Each action requires a different amount of time Patching a service: Download, extract, apply, restart Exploit a service Firewalling a service In anticipation games as in TATL the fastest action win Player can be taken by surprise Outline: Introduction > Model > Strategy > Conclusion 17

18 The element of surprise Exploit 4 in 3 unit Network Firewall 4 in 1 unit Outline: Introduction > Model > Strategy > Conclusion 18

19 Type of attacks Anticipation games allows to model Denial of service Buffer overflow execution Permission abuse Cross scripting Information leak. Outline: Introduction > Model > Strategy > Conclusion 19

20 Rule Language Outline: Introduction > Model > Strategy > Conclusion 20

21 Semantic A successor node is compromised At least, one of the node the belongs to the equivalence is public Outline: Introduction > Model > Strategy > Conclusion 21

22 Rules example Outline: Introduction > Model > Strategy > Conclusion 22

23 A Play example User Database 6 Web server server Client 1 Client 2 Client 3 = Player Ati Action Rule Target Succ Admin Choose Execute Firewall Unfirewall Patch 5 4 Intruder Fail Choose Execute Compromise 0day Forward Backward Outline: Introduction > Model > Strategy > Conclusion 23

24 Properties Semantic Outline: Introduction > Model > Strategy > Conclusion 24

25 Semantic The player A have a strategy to satisfy the property In every future the node will be compromised Outline: Introduction > Model > Strategy > Conclusion 25

26 Property Illustration Outline: Introduction > Model > Strategy > Conclusion 26

27 Decidability TATL Formula model checking in Anticipation game is decidable and EXPTIME complete Outline: Introduction > Model > Strategy > Conclusion 27

28 One More Thing!

29 It Work! Model and Strategies are fully implemented in C The talk example cannot be analyzed by hand 4011 plays states tt Outline: Introduction > Model > Strategy > Conclusion 29

30 Analyzer Demo

31 Future Work CIA model Abstraction Non determinism Outline: Introduction > Model > Strategy > Conclusion 31

32 Conclusion Game and Time provide a richer model for intrusion i analysis Many directions to explore Outline: Introduction > Model > Strategy > Conclusion 32

33 Questions During this work no network service was injured or tortured. Outline: Introduction > Model > Strategy > Conclusion 33

34 Rule execution time Outline: Introduction > Model > Strategy > Conclusion 34

How Much Memory is Needed to Win in Partial-Observation Games

How Much Memory is Needed to Win in Partial-Observation Games How Much Memory is Needed to Win in Partial-Observation Games Laurent Doyen LSV, ENS Cachan & CNRS & Krishnendu Chatterjee IST Austria GAMES 11 How Much Memory is Needed to Win in Partial-Observation Games

More information

Software Engineering Design & Construction

Software Engineering Design & Construction Winter Semester 16/17 Software Engineering Design & Construction Dr. Michael Eichberg Fachgebiet Softwaretechnik Technische Universität Darmstadt Introduction - Software Engineering Software Engineering

More information

Timed Games UPPAAL-TIGA. Alexandre David

Timed Games UPPAAL-TIGA. Alexandre David Timed Games UPPAAL-TIGA Alexandre David 1.2.05 Overview Timed Games. Algorithm (CONCUR 05). Strategies. Code generation. Architecture of UPPAAL-TIGA. Interactive game. Timed Games with Partial Observability.

More information

Lecture 19 November 6, 2014

Lecture 19 November 6, 2014 6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 2014 Prof. Erik Demaine Lecture 19 November 6, 2014 Scribes: Jeffrey Shen, Kevin Wu 1 Overview Today, we ll cover a few more 2 player games

More information

Introduction to Game Theory

Introduction to Game Theory Introduction to Game Theory (From a CS Point of View) Olivier Serre Serre@irif.fr IRIF (CNRS & Université Paris Diderot Paris 7) 14th of September 2017 Master Parisien de Recherche en Informatique Who

More information

General Game Playing (GGP) Winter term 2013/ Summary

General Game Playing (GGP) Winter term 2013/ Summary General Game Playing (GGP) Winter term 2013/2014 10. Summary Sebastian Wandelt WBI, Humboldt-Universität zu Berlin General Game Playing? General Game Players are systems able to understand formal descriptions

More information

Computer Game Programming Board Games

Computer Game Programming Board Games 1-466 Computer Game Programg Board Games Maxim Likhachev Robotics Institute Carnegie Mellon University There Are Still Board Games Maxim Likhachev Carnegie Mellon University 2 Classes of Board Games Two

More information

Discerning the Intent of Maturity Models from Characterizations of Security Posture

Discerning the Intent of Maturity Models from Characterizations of Security Posture Discerning the Intent of Maturity Models from Characterizations of Security Posture Rich Caralli January 2012 MATURITY MODELS Maturity models in their simplest form are intended to provide a benchmark

More information

Game Theory. 6 Dynamic Games with imperfect information

Game Theory. 6 Dynamic Games with imperfect information Game Theory 6 Dynamic Games with imperfect information Review of lecture five Game tree and strategies Dynamic games of perfect information Games and subgames ackward induction Subgame perfect Nash equilibrium

More information

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain This fiche is part of the wider roadmap for cross-cutting KETs activities Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain Cross-cutting

More information

Learning Cyber Security Through Gamification

Learning Cyber Security Through Gamification ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 8(7), 642 649, April 2015 DOI: 10.17485/ijst/2015/v8i7/67760 Learning Cyber Security Through Gamification

More information

Games of Perfect Information and Backward Induction

Games of Perfect Information and Backward Induction Games of Perfect Information and Backward Induction Economics 282 - Introduction to Game Theory Shih En Lu Simon Fraser University ECON 282 (SFU) Perfect Info and Backward Induction 1 / 14 Topics 1 Basic

More information

Survivability of critical infrastructure

Survivability of critical infrastructure Foundations for Survivable Systems Engineering Survivability of critical infrastructure systems has become an urgent priority. These large-scale networked systems improve the efficiency of organizations

More information

ULS Systems Research Roadmap

ULS Systems Research Roadmap ULS Systems Research Roadmap Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2008 Carnegie Mellon University Roadmap Intent Help evaluate the ULS systems relevance of existing

More information

EXPLOITING STEAM LOBBIES AND MATCHMAKING

EXPLOITING STEAM LOBBIES AND MATCHMAKING Revision 1 EXPLOITING STEAM LOBBIES AND MATCHMAKING BY LUIGI AURIEMMA Description of the security vulnerabilities that affected the Steam lobbies and all the games using the Steam Matchmaking functionalities.

More information

Decomposition Search A Combinatorial Games Approach to Game Tree Search, with Applications to Solving Go Endgames

Decomposition Search A Combinatorial Games Approach to Game Tree Search, with Applications to Solving Go Endgames Decomposition Search Combinatorial Games pproach to Game Tree Search, with pplications to Solving Go Endgames Martin Müller University of lberta Edmonton, Canada Decomposition Search What is decomposition

More information

CMPUT 657: Heuristic Search

CMPUT 657: Heuristic Search CMPUT 657: Heuristic Search Assignment 1: Two-player Search Summary You are to write a program to play the game of Lose Checkers. There are two goals for this assignment. First, you want to build the smallest

More information

Frameworks for Assessing IT Systems Engineering Acquisition Issues and Proposed Approaches in Support of Public Law 111

Frameworks for Assessing IT Systems Engineering Acquisition Issues and Proposed Approaches in Support of Public Law 111 Frameworks for Assessing IT Systems Engineering Acquisition Issues and Proposed Approaches in Support of Public Law 111 15 th Annual Systems Engineering Conference Net Centric Operations/Interoperability

More information

Computing Elo Ratings of Move Patterns. Game of Go

Computing Elo Ratings of Move Patterns. Game of Go in the Game of Go Presented by Markus Enzenberger. Go Seminar, University of Alberta. May 6, 2007 Outline Introduction Minorization-Maximization / Bradley-Terry Models Experiments in the Game of Go Usage

More information

Extensive Form Games. Mihai Manea MIT

Extensive Form Games. Mihai Manea MIT Extensive Form Games Mihai Manea MIT Extensive-Form Games N: finite set of players; nature is player 0 N tree: order of moves payoffs for every player at the terminal nodes information partition actions

More information

Automatic Heuristic Construction in a Complete General Game Player

Automatic Heuristic Construction in a Complete General Game Player Automatic Heuristic Construction in a Complete General Game Player Gregory Kuhlmann Kurt Dresner Peter Stone Learning Agents Research Group Department of Computer Sciences The University of Texas at Austin

More information

Jim and Nim. Japheth Wood New York Math Circle. August 6, 2011

Jim and Nim. Japheth Wood New York Math Circle. August 6, 2011 Jim and Nim Japheth Wood New York Math Circle August 6, 2011 Outline 1. Games Outline 1. Games 2. Nim Outline 1. Games 2. Nim 3. Strategies Outline 1. Games 2. Nim 3. Strategies 4. Jim Outline 1. Games

More information

Lecture 6: Metagaming

Lecture 6: Metagaming Lecture 6: Game Optimization Symmetry and Factoring Structure Identification Evaluation Functions Monte Carlo Tree Search 1 Rule Ordering Example: ancestor(x,z)

More information

Automated Software Engineering Writing Code to Help You Write Code. Gregory Gay CSCE Computing in the Modern World October 27, 2015

Automated Software Engineering Writing Code to Help You Write Code. Gregory Gay CSCE Computing in the Modern World October 27, 2015 Automated Software Engineering Writing Code to Help You Write Code Gregory Gay CSCE 190 - Computing in the Modern World October 27, 2015 Software Engineering The development and evolution of high-quality

More information

Playing Games. Henry Z. Lo. June 23, We consider writing AI to play games with the following properties:

Playing Games. Henry Z. Lo. June 23, We consider writing AI to play games with the following properties: Playing Games Henry Z. Lo June 23, 2014 1 Games We consider writing AI to play games with the following properties: Two players. Determinism: no chance is involved; game state based purely on decisions

More information

1.1 Investigate the capabilities and limitations of a range of digital gaming platforms

1.1 Investigate the capabilities and limitations of a range of digital gaming platforms Unit Title: Game design concepts Level: 2 OCR unit number: 215 Credit value: 4 Guided learning hours: 30 Unit reference number: T/600/7735 Unit purpose and aim This unit helps learners to understand the

More information

How Shall We Play a Game?

How Shall We Play a Game? How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley Carnegie Mellon University {tiffanybao,

More information

A game-based model for human-robots interaction

A game-based model for human-robots interaction A game-based model for human-robots interaction Aniello Murano and Loredana Sorrentino Dipartimento di Ingegneria Elettrica e Tecnologie dell Informazione Università degli Studi di Napoli Federico II,

More information

Interactive Visualizations for Cyber-

Interactive Visualizations for Cyber- Interactive Visualizations for Cyber- Mission Awareness ARO MURI on Cyber Situation Awareness Year One Review Meeting Tobias Höllerer Four Eyes Laboratory (Imaging, Interaction, and Innovative Interfaces),

More information

Local and Low-Cost White Space Detection

Local and Low-Cost White Space Detection Local and Low-Cost White Space Detection Ahmed Saeed*, Khaled A. Harras, Ellen Zegura*, and Mostafa Ammar* *Georgia Institute of Technology Carnegie Mellon University Qatar White Space Definition A vacant

More information

Game Design From Concepts To Implementation

Game Design From Concepts To Implementation Game Design From Concepts To Implementation Games Go Online The Dawn of Online Games Yesterday: we were buying boxes from the shelf Bad news: those times are gone! Today: we download a software for free

More information

Game Playing. Why do AI researchers study game playing? 1. It s a good reasoning problem, formal and nontrivial.

Game Playing. Why do AI researchers study game playing? 1. It s a good reasoning problem, formal and nontrivial. Game Playing Why do AI researchers study game playing? 1. It s a good reasoning problem, formal and nontrivial. 2. Direct comparison with humans and other computer programs is easy. 1 What Kinds of Games?

More information

Infrastructure as Code CS398 - ACC

Infrastructure as Code CS398 - ACC Infrastructure as Code CS398 - ACC Prof. Robert J. Brunner Ben Congdon Tyler Kim MP7 How s it going? Final Autograder run: - Tonight ~8pm - Tomorrow ~3pm Due tomorrow at 11:59 pm. Latest Commit to the

More information

Packaging Projects, Maps and Layers. Shilpi Jain Melanie Summers

Packaging Projects, Maps and Layers. Shilpi Jain Melanie Summers Packaging Projects, Maps and Layers Shilpi Jain Melanie Summers What can be packaged Layer Map Project Layer package (.lypkx) Tile package (.tpk) Scene layer package (.slpk) Map package (.mpkx) Mobile

More information

4. Game Theory: Introduction

4. Game Theory: Introduction 4. Game Theory: Introduction Laurent Simula ENS de Lyon L. Simula (ENSL) 4. Game Theory: Introduction 1 / 35 Textbook : Prajit K. Dutta, Strategies and Games, Theory and Practice, MIT Press, 1999 L. Simula

More information

COMP219: COMP219: Artificial Intelligence Artificial Intelligence Dr. Annabel Latham Lecture 12: Game Playing Overview Games and Search

COMP219: COMP219: Artificial Intelligence Artificial Intelligence Dr. Annabel Latham Lecture 12: Game Playing Overview Games and Search COMP19: Artificial Intelligence COMP19: Artificial Intelligence Dr. Annabel Latham Room.05 Ashton Building Department of Computer Science University of Liverpool Lecture 1: Game Playing 1 Overview Last

More information

PASSENGER. Story of a convergent pipeline. Thomas Felix TG - Passenger Ubisoft Montréal. Pierre Blaizeau TWINE Ubisoft Montréal

PASSENGER. Story of a convergent pipeline. Thomas Felix TG - Passenger Ubisoft Montréal. Pierre Blaizeau TWINE Ubisoft Montréal PASSENGER Story of a convergent pipeline Thomas Felix TG - Passenger Ubisoft Montréal Pierre Blaizeau TWINE Ubisoft Montréal Technology Group PASSENGER How to expand your game universe? How to bridge game

More information

Backward Induction and Stackelberg Competition

Backward Induction and Stackelberg Competition Backward Induction and Stackelberg Competition Economics 302 - Microeconomic Theory II: Strategic Behavior Shih En Lu Simon Fraser University (with thanks to Anke Kessler) ECON 302 (SFU) Backward Induction

More information

Announcements. CS 188: Artificial Intelligence Fall Today. Tree-Structured CSPs. Nearly Tree-Structured CSPs. Tree Decompositions*

Announcements. CS 188: Artificial Intelligence Fall Today. Tree-Structured CSPs. Nearly Tree-Structured CSPs. Tree Decompositions* CS 188: Artificial Intelligence Fall 2010 Lecture 6: Adversarial Search 9/1/2010 Announcements Project 1: Due date pushed to 9/15 because of newsgroup / server outages Written 1: up soon, delayed a bit

More information

Extensive Games with Perfect Information. Start by restricting attention to games without simultaneous moves and without nature (no randomness).

Extensive Games with Perfect Information. Start by restricting attention to games without simultaneous moves and without nature (no randomness). Extensive Games with Perfect Information There is perfect information if each player making a move observes all events that have previously occurred. Start by restricting attention to games without simultaneous

More information

Soar-RL A Year of Learning

Soar-RL A Year of Learning Soar-RL A Year of Learning Nate Derbinsky University of Michigan Outline The Big Picture Developing Soar-RL Agents Controlling the Soar-RL Algorithm Debugging Soar-RL Soar-RL Performance Nuggets & Coal

More information

Lecture 5: Subgame Perfect Equilibrium. November 1, 2006

Lecture 5: Subgame Perfect Equilibrium. November 1, 2006 Lecture 5: Subgame Perfect Equilibrium November 1, 2006 Osborne: ch 7 How do we analyze extensive form games where there are simultaneous moves? Example: Stage 1. Player 1 chooses between fin,outg If OUT,

More information

ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES

ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES DIRK KRAFZIG MANAS DEB MARTIN FRICK DIGITAL COOKBOOK ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES For more details visit: https://digital-cookbook.com/ GRAPHIC DESIGN BY KNUT JUNKER AND DIETMAR

More information

Feature Learning Using State Differences

Feature Learning Using State Differences Feature Learning Using State Differences Mesut Kirci and Jonathan Schaeffer and Nathan Sturtevant Department of Computing Science University of Alberta Edmonton, Alberta, Canada {kirci,nathanst,jonathan}@cs.ualberta.ca

More information

CMSC 671 Project Report- Google AI Challenge: Planet Wars

CMSC 671 Project Report- Google AI Challenge: Planet Wars 1. Introduction Purpose The purpose of the project is to apply relevant AI techniques learned during the course with a view to develop an intelligent game playing bot for the game of Planet Wars. Planet

More information

Hack Attack. Rules by Jeffrey Wang

Hack Attack. Rules by Jeffrey Wang Hack Attack Rules by Jeffrey Wang Two hackers are attacking a super computer in a company. The company frantically gets their IT official to stop the attack. Along the way, the IT official grabs one of

More information

CHAPTER 5 DESIGN AND ANALYSIS OF COMPLEMENTARY PASS- TRANSISTOR WITH ASYNCHRONOUS ADIABATIC LOGIC CIRCUITS

CHAPTER 5 DESIGN AND ANALYSIS OF COMPLEMENTARY PASS- TRANSISTOR WITH ASYNCHRONOUS ADIABATIC LOGIC CIRCUITS 70 CHAPTER 5 DESIGN AND ANALYSIS OF COMPLEMENTARY PASS- TRANSISTOR WITH ASYNCHRONOUS ADIABATIC LOGIC CIRCUITS A novel approach of full adder and multipliers circuits using Complementary Pass Transistor

More information

Hearthstone Korea Major Rules

Hearthstone Korea Major Rules Hearthstone Korea Major Rules 1 The outline of the Korea Major and definitions 1.1 Hearthstone Korea Major is held under the following rules. 1.2 Any other matters uninvolved with the following rules are

More information

An analysis of Cannon By Keith Carter

An analysis of Cannon By Keith Carter An analysis of Cannon By Keith Carter 1.0 Deploying for Battle Town Location The initial placement of the towns, the relative position to their own soldiers, enemy soldiers, and each other effects the

More information

Bellairs Games Workshop. Massively Multiplayer Games

Bellairs Games Workshop. Massively Multiplayer Games Bellairs Games Workshop Massively Multiplayer Games Jörg Kienzle McGill Games Workshop - Bellairs, 2005, Jörg Kienzle Slide 1 Outline Intro on Massively Multiplayer Games Historical Perspective Technical

More information

Strategic Bargaining. This is page 1 Printer: Opaq

Strategic Bargaining. This is page 1 Printer: Opaq 16 This is page 1 Printer: Opaq Strategic Bargaining The strength of the framework we have developed so far, be it normal form or extensive form games, is that almost any well structured game can be presented

More information

NORMAL FORM GAMES: invariance and refinements DYNAMIC GAMES: extensive form

NORMAL FORM GAMES: invariance and refinements DYNAMIC GAMES: extensive form 1 / 47 NORMAL FORM GAMES: invariance and refinements DYNAMIC GAMES: extensive form Heinrich H. Nax hnax@ethz.ch & Bary S. R. Pradelski bpradelski@ethz.ch March 19, 2018: Lecture 5 2 / 47 Plan Normal form

More information

REQUIRED EQUIPMENT. PLAYING TIME: approximately 20 minutes. NUMBER OF PLAYERS: 1 or 2

REQUIRED EQUIPMENT. PLAYING TIME: approximately 20 minutes. NUMBER OF PLAYERS: 1 or 2 Any gardener knows a tiny number of snails can destroy an entire vegetable patch. Snail Invasion! commemorates this epic battle. Will the snails completely infest the garden and kill off the plants? Will

More information

Computational Methods for Non-Cooperative Game Theory

Computational Methods for Non-Cooperative Game Theory Computational Methods for Non-Cooperative Game Theory What is a game? Introduction A game is a decision problem in which there a multiple decision makers, each with pay-off interdependence Each decisions

More information

Applying Modern Reinforcement Learning to Play Video Games. Computer Science & Engineering Leung Man Ho Supervisor: Prof. LYU Rung Tsong Michael

Applying Modern Reinforcement Learning to Play Video Games. Computer Science & Engineering Leung Man Ho Supervisor: Prof. LYU Rung Tsong Michael Applying Modern Reinforcement Learning to Play Video Games Computer Science & Engineering Leung Man Ho Supervisor: Prof. LYU Rung Tsong Michael Outline Term 1 Review Term 2 Objectives Experiments & Results

More information

Making Simple Decisions CS3523 AI for Computer Games The University of Aberdeen

Making Simple Decisions CS3523 AI for Computer Games The University of Aberdeen Making Simple Decisions CS3523 AI for Computer Games The University of Aberdeen Contents Decision making Search and Optimization Decision Trees State Machines Motivating Question How can we program rules

More information

Practical Aspects of Logic in AI

Practical Aspects of Logic in AI Artificial Intelligence Topic 15 Practical Aspects of Logic in AI Reading: Russell and Norvig, Chapter 10 Description Logics as Ontology Languages for the Semantic Web, F. Baader, I. Horrocks and U.Sattler,

More information

AGENTLESS ARCHITECTURE

AGENTLESS ARCHITECTURE ansible.com +1 919.667.9958 WHITEPAPER THE BENEFITS OF AGENTLESS ARCHITECTURE A management tool should not impose additional demands on one s environment in fact, one should have to think about it as little

More information

Implications as rules

Implications as rules DIPLEAP Wien 27.11.2010 p. 1 Implications as rules Thomas Piecha Peter Schroeder-Heister Wilhelm-Schickard-Institut für Informatik Universität Tübingen DIPLEAP Wien 27.11.2010 p. 2 Philosophical / foundational

More information

CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS

CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS Document Control Version: 1.0 Author: CS Policies and Standards Section - MOTC Classification: Public Date of Issue: November 2016 Contents

More information

Theorem Proving and Model Checking

Theorem Proving and Model Checking Theorem Proving and Model Checking (or: how to have your cake and eat it too) Joe Hurd joe.hurd@comlab.ox.ac.uk Cakes Talk Computing Laboratory Oxford University Theorem Proving and Model Checking Joe

More information

Trustworthy Refinement Through Intrusion-Aware Design

Trustworthy Refinement Through Intrusion-Aware Design Trustworthy Refinement Through Intrusion-Aware Design Robert J. Ellison Andrew P. Moore October 2002 TECHNICAL REPORT CMU/SEI-2002-TR-036 ESC-TR-2002-036 Pittsburgh, PA 15213-3890 Trustworthy Refinement

More information

Game Playing State of the Art

Game Playing State of the Art Game Playing State of the Art Checkers: Chinook ended 40 year reign of human world champion Marion Tinsley in 1994. Used an endgame database defining perfect play for all positions involving 8 or fewer

More information

Counter-Strike Season Eighteen OVERVIEW

Counter-Strike Season Eighteen OVERVIEW OVERVIEW We are excited to launch Club Conflict Season Eighteen. We will be beta testing the Club Conflict website and our new Club Conflict Client (featuring Easy AntiCheat). Also, we will be testing

More information

Department of Computer Science and Engineering The Chinese University of Hong Kong. Year Final Year Project

Department of Computer Science and Engineering The Chinese University of Hong Kong. Year Final Year Project Digital Interactive Game Interface Table Apps for ipad Supervised by: Professor Michael R. Lyu Student: Ng Ka Hung (1009615714) Chan Hing Faat (1009618344) Year 2011 2012 Final Year Project Department

More information

Conversion Masters in IT (MIT) AI as Representation and Search. (Representation and Search Strategies) Lecture 002. Sandro Spina

Conversion Masters in IT (MIT) AI as Representation and Search. (Representation and Search Strategies) Lecture 002. Sandro Spina Conversion Masters in IT (MIT) AI as Representation and Search (Representation and Search Strategies) Lecture 002 Sandro Spina Physical Symbol System Hypothesis Intelligent Activity is achieved through

More information

Content Page. Odds about Card Distribution P Strategies in defending

Content Page. Odds about Card Distribution P Strategies in defending Content Page Introduction and Rules of Contract Bridge --------- P. 1-6 Odds about Card Distribution ------------------------- P. 7-10 Strategies in bidding ------------------------------------- P. 11-18

More information

Research on Progressive Die Design System Based on Rule-engine

Research on Progressive Die Design System Based on Rule-engine 2017 2nd International Conference on Manufacturing Science and Information Engineering (ICMSIE 2017) ISBN: 978-1-60595-516-2 Research on Progressive Die Design System Based on Rule-engine Shaoling Li and

More information

Field Device Manager Express

Field Device Manager Express Honeywell Process Solutions Field Device Manager Express Software Installation User's Guide EP-FDM-02430X R430 June 2012 Release 430 Honeywell Notices and Trademarks Copyright 2010 by Honeywell International

More information

Parameter-Free Tree Style Pipeline in Asynchronous Parallel Game-Tree Search

Parameter-Free Tree Style Pipeline in Asynchronous Parallel Game-Tree Search Parameter-Free Tree Style Pipeline in Asynchronous Parallel Game-Tree Search Shu YOKOYAMA, Tomoyuki KANEKO, Tetsuro TANAKA 2015 07 03T11:15+02:00 ACG2015 Leiden Motivation Game tree search in distributed

More information

CSC 380 Final Presentation. Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis

CSC 380 Final Presentation. Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis CSC 380 Final Presentation Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis Intro Connect 4 is a zero-sum game, which means one party wins everything or both parties win nothing; there is no mutual

More information

Reasoning About Strategies

Reasoning About Strategies Reasoning About Strategies Johan van Benthem 1 University of Amsterdam and Stanford University Abstract. Samson Abramsky has placed landmarks in the world of logic and games that I have long admired. In

More information

FACEBOOK CHANGES & YOUR CHURCH Live Q&A Webinar. Presented by Jerod Clark February 27, 2013

FACEBOOK CHANGES & YOUR CHURCH Live Q&A Webinar. Presented by Jerod Clark February 27, 2013 FACEBOOK CHANGES & YOUR CHURCH Live Q&A Webinar Presented by Jerod Clark February 27, 2013 WHY SHOULD I CARE? WHY SHOULD I CARE? People in your congregation are already there WHY SHOULD I CARE? People

More information

2015 NAFIC Convention 2

2015 NAFIC Convention 2 Dan Allison-A Professional Approach to A Professional Approach to Referrals and Prospecting How to Turn Clients and Prospects into Advocates for Your Brand Why did you select this advisor? How does your

More information

Important USCF Rules - 5 th Edition USCF Rulebook

Important USCF Rules - 5 th Edition USCF Rulebook Important USCF Rules - 5 th Edition USCF Rulebook 5E and 5F: Standard timer for sudden death The standard timer for sudden death time controls are digital clocks with delay or addback capability. Other

More information

Teleoperated Robot Controlling Interface: an Internet of Things Based Approach

Teleoperated Robot Controlling Interface: an Internet of Things Based Approach Proc. 1 st International Conference on Machine Learning and Data Engineering (icmlde2017) 20-22 Nov 2017, Sydney, Australia ISBN: 978-0-6480147-3-7 Teleoperated Robot Controlling Interface: an Internet

More information

From ProbLog to ProLogic

From ProbLog to ProLogic From ProbLog to ProLogic Angelika Kimmig, Bernd Gutmann, Luc De Raedt Fluffy, 21/03/2007 Part I: ProbLog Motivating Application ProbLog Inference Experiments A Probabilistic Graph Problem What is the probability

More information

Double dummy analysis of bridge hands

Double dummy analysis of bridge hands Double dummy analysis of bridge hands Provided by Peter Cheung This is the technique in solving how many tricks can be make for No Trump, Spade, Heart, Diamond, or, Club contracts when all 52 cards are

More information

Fault analysis framework. Ana Gainaru, Franck Cappello, Bill Kramer

Fault analysis framework. Ana Gainaru, Franck Cappello, Bill Kramer Fault analysis framework Ana Gainaru, Franck Cappello, Bill Kramer Third Workshop of the INRIA Illinois Joint Laboratory on Petascale Computing, Bordeaux June 22 24 2010 Contents Introduction Framework

More information

Adversarial Search. CS 486/686: Introduction to Artificial Intelligence

Adversarial Search. CS 486/686: Introduction to Artificial Intelligence Adversarial Search CS 486/686: Introduction to Artificial Intelligence 1 Introduction So far we have only been concerned with a single agent Today, we introduce an adversary! 2 Outline Games Minimax search

More information

Game Tree Search 1/6/17

Game Tree Search 1/6/17 Game Tree Search /6/7 Frameworks for Decision-Making. Goal-directed planning Agents want to accomplish some goal. The agent will use search to devise a plan.. Utility maximization Agents ascribe a utility

More information

APPLY THE 6 KEYS TO CREATING CONNECTION

APPLY THE 6 KEYS TO CREATING CONNECTION MODULE LESSON LEAD PEOPLE INTO YOUR SALES CYCLE BY BUILDING TRUST DESIGN YOUR OWN TRUST- BUILDING SALES CYCLE APPLY THE 6 KEYS TO CREATING CONNECTION CORE SELF-PROMOTIONAL STRATEGIES CONSIDER THE 6 CORE

More information

Fitness for purpose in its broadest sense in a digital context

Fitness for purpose in its broadest sense in a digital context Fitness for purpose in its broadest sense in a digital context Question I have been discussing fitness for purpose in the broadest sense with my students and would like to seek clarity on this. Can you

More information

Game Theory: The Basics. Theory of Games and Economics Behavior John Von Neumann and Oskar Morgenstern (1943)

Game Theory: The Basics. Theory of Games and Economics Behavior John Von Neumann and Oskar Morgenstern (1943) Game Theory: The Basics The following is based on Games of Strategy, Dixit and Skeath, 1999. Topic 8 Game Theory Page 1 Theory of Games and Economics Behavior John Von Neumann and Oskar Morgenstern (1943)

More information

Section 8 Operational Movement

Section 8 Operational Movement Section 8: Operational Movement V8.00 Operational Movement V8.10 General Rules of Movement V8.11 Operational Movement, sometimes called Strategic Movement, is the travel of warp capable objects from one

More information

Free Cell Solver. Copyright 2001 Kevin Atkinson Shari Holstege December 11, 2001

Free Cell Solver. Copyright 2001 Kevin Atkinson Shari Holstege December 11, 2001 Free Cell Solver Copyright 2001 Kevin Atkinson Shari Holstege December 11, 2001 Abstract We created an agent that plays the Free Cell version of Solitaire by searching through the space of possible sequences

More information

maxon document number:

maxon document number: maxon document number: 791272-04 1 Table of contents... 2 2 Table of figures... 3 3 Introduction... 4 4 How to use this guide... 4 5 Safety Instructions... 5 6 Performance Data... 6 6.1 Motor data... 6

More information

Adversarial Search (Game Playing)

Adversarial Search (Game Playing) Artificial Intelligence Adversarial Search (Game Playing) Chapter 5 Adapted from materials by Tim Finin, Marie desjardins, and Charles R. Dyer Outline Game playing State of the art and resources Framework

More information

etwinning Thematic Conference: Athens, Greece, September 2017

etwinning Thematic Conference: Athens, Greece, September 2017 etwinning Thematic Conference: Athens, Greece, 28-30 September 2017 1 About the FORETELL project The objectives: 1.Awareness of good practices against floods and fires, in a safe and challenging manner;

More information

Quick work: Memory allocation

Quick work: Memory allocation Quick work: Memory allocation The OS is using a fixed partition algorithm. Processes place requests to the OS in the following sequence: P1=15 KB, P2=5 KB, P3=30 KB Draw the memory map at the end, if each

More information

Comparison of Monte Carlo Tree Search Methods in the Imperfect Information Card Game Cribbage

Comparison of Monte Carlo Tree Search Methods in the Imperfect Information Card Game Cribbage Comparison of Monte Carlo Tree Search Methods in the Imperfect Information Card Game Cribbage Richard Kelly and David Churchill Computer Science Faculty of Science Memorial University {richard.kelly, dchurchill}@mun.ca

More information

In this technical note, the use of the Build signal tool will be covered in more detail.

In this technical note, the use of the Build signal tool will be covered in more detail. Case study: how to properly use the Build signal tool? 1 The Build signal tool NOVA Technical Note 18 Using the Build signal tool Every command parameter or signal, measured or calculated, is identified

More information

RAGE: ROAD RAGE TOURNAMENT RULES

RAGE: ROAD RAGE TOURNAMENT RULES QUAKECON 2017 RAGE: ROAD RAGE TOURNAMENT RULES Compliance with all tournament regulations is a mandatory condition of participation in QuakeCon. It is your responsibility to be aware of and understand

More information

G5212: Game Theory. Mark Dean. Spring 2017

G5212: Game Theory. Mark Dean. Spring 2017 G5212: Game Theory Mark Dean Spring 2017 The Story So Far... Last week we Introduced the concept of a dynamic (or extensive form) game The strategic (or normal) form of that game In terms of solution concepts

More information

MATKA. Foreword. 1. Event Rules

MATKA. Foreword. 1. Event Rules Foreword This document outlines the rules that should at all times be followed when participating in Matka competition. Failure to adhere to these rules may be penalized as outlined. It should be remembered

More information

GOAPin. Chris Conway Lead AI Engineer, Crystal Dynamics

GOAPin. Chris Conway Lead AI Engineer, Crystal Dynamics GOAPin Chris Conway Lead AI Engineer, Crystal Dynamics GOAP in Tomb Raider Started in 2006 for unannounced title at the request of our lead designer, based on his impressions from the GOAP presentation

More information

Simple Search Algorithms

Simple Search Algorithms Lecture 3 of Artificial Intelligence Simple Search Algorithms AI Lec03/1 Topics of this lecture Random search Search with closed list Search with open list Depth-first and breadth-first search again Uniform-cost

More information

Knowledge Management for Command and Control

Knowledge Management for Command and Control Knowledge Management for Command and Control Dr. Marion G. Ceruti, Dwight R. Wilcox and Brenda J. Powers Space and Naval Warfare Systems Center, San Diego, CA 9 th International Command and Control Research

More information

On form and function in board games

On form and function in board games On form and function in board games Chris Sangwin School of Mathematics University of Edinburgh December 2017 Chris Sangwin (University of Edinburgh) On form and function in board games December 2017 1

More information

Examples Debug Intro BT Intro BT Edit Real Debug

Examples Debug Intro BT Intro BT Edit Real Debug More context Archetypes Architecture Evolution Intentional workflow change New workflow almost reverted Examples Debug Intro BT Intro BT Edit Real Debug 36 unique combat AI split into 11 archetypes 5 enemy

More information