Model of Computation for the Internet. The lectures will focus on a game theoretic model of computations so as to devise new mechanisms to improve the security of a socio-technological network, while paying proportional attention to various intertwined issues: namely in the form of deception, privacy, trust, economic utilities and stability. For this purpose, we primarily rely on a realistic formulation of classical information-asymmetric signaling games, in a repeated form, while allowing the agents to dynamically vary their utility functions. To better understand the multi-faceted security concerns in existing and emerging multi-agent interactions over the Internet, we will map, model and analyze various challenging examples of security concerns: namely, those occurring in Search, Ad-exchange, Data Markets, Medical and Finance systems. We also describe a bridge to the future by investigating the extendability of the proposed mechanisms in a specific embodiment, for example, as a simple browser, supported by efficient virtualization technology and with the host operating systems housed in a cloud. New malware that exploit virtualization technology (e.g., BluePills) is of particular interest and relevant in this context, and will be abstracted in a simple game: PWN IT.
The lectures will build on our earlier experience in the areas of systems biology (evolutionary models), game theory, data science, model checking, causality analysis, cyber security, insider threat, virtualization and data markets.