Introduction Models of Attack Trees Computational Semantics. Attack Trees. Models and Computation. Jan Willemson, Aivo Jürgenson, Margus Niitsoo

Size: px
Start display at page:

Download "Introduction Models of Attack Trees Computational Semantics. Attack Trees. Models and Computation. Jan Willemson, Aivo Jürgenson, Margus Niitsoo"

Transcription

1 Attack Trees Models and Computation Jan Willemson, Aivo Jürgenson, Margus Niitsoo Cybernetica, Estonia January 19th, 2010 University of Luxembourg

2 We will use the basic multi-parameter attack tree model introduced in Introduction Models of Attack Trees Computational Semantics subsequent analysis. An example attack tree originally given by Weiss [4] and adopted from [6] is presented in Figure 1. An Attack Tree Figure 1. Example of an attack tree Obtain Administrator Privileges OR Access System Console Obtain Administrator Password OR OR Enter Computer Center Corrupt Operator Guess Password Look Over Sys.Admin Shoulder Trojan Horse SA Account Corrupt Sys.Admin OR Break Into Computing Center Unattended Guest AND Obtain Password File Encounter Guessable Password

3 An Attack RDAG

4 Brief History Hierarchical approach to security evaluation: Fault trees (Vesely, Goldberg, Roberts, Haasl, 1981) Threat logic trees (Weiss, 1991) Attack trees (Schneier, 1999) Foundations of Attack Trees (Mauw & Oostdijk, 2005) Multi-parameter attack trees (Buldas et al., 2006)

5 Our Papers Buldas, Laud, Priisalu, Saarepera, Willemson, Rational Choice of Security Measures via Multi-Parameter Attack Trees, CRITIS 2006 Jürgenson, Willemson, Processing Multi-parameter Attacktrees with Estimated Parameter Values, IWSEC 2007 Jürgenson, Willemson, Computing Exact Outcomes of Multi-parameter Attack Trees, OTM 2008, IS 2008 Jürgenson, Willemson, Serial Model for Attack Tree Computations, ICISC 2009 Jürgenson, Willemson, On Fast and Approximate Attack Tree Computations, submitted to ISPEC 2010 Niitsoo, Finding the Optimal Behavior for Adaptive Attack trees, submitted to???

6 From Qualitative to Quantitative Analysis Once an attack tree is complete, one can use it for qualitative description of attack scenarios An Attack Tree for the Border Gateway Protocol, IETF draft, 2004

7 From Qualitative to Quantitative Analysis Once an attack tree is complete, one can use it for qualitative description of attack scenarios An Attack Tree for the Border Gateway Protocol, IETF draft, analyze some property of the attacks (cost, feasibility, skill level required, etc.) Schneier, 1999 Mauw&Oostdijk, 2005

8 From Qualitative to Quantitative Analysis Once an attack tree is complete, one can use it for qualitative description of attack scenarios An Attack Tree for the Border Gateway Protocol, IETF draft, analyze some property of the attacks (cost, feasibility, skill level required, etc.) Schneier, 1999 Mauw&Oostdijk, try to find the attack most profitable for the attacker Buldas et al., 2006

9 Rational Attacker Paradigm In order to find the best attack, we must assume some kind of rationality of the attacker The original model of Buldas et al. assumes that the attacker is a fully rational utility maximizer

10 Rational Attacker Paradigm In order to find the best attack, we must assume some kind of rationality of the attacker The original model of Buldas et al. assumes that the attacker is a fully rational utility maximizer Jürgenson&Willemson, 2009, builds on another framework: The attacker tries to first, maximize success probability second, achieve the best possible outcome Hence, a certain form of irrational behavior is obtained This is the first known treatment of irrational attacks using quantitative methods

11 Rational Attacker Paradigm In order to find the best attack, we must assume some kind of rationality of the attacker The original model of Buldas et al. assumes that the attacker is a fully rational utility maximizer Jürgenson&Willemson, 2009, builds on another framework: The attacker tries to first, maximize success probability second, achieve the best possible outcome Hence, a certain form of irrational behavior is obtained This is the first known treatment of irrational attacks using quantitative methods Niitsoo, 2010, has shown how to apply classical decision theory to attack tree computations

12 Parallel vs. Serial Approach Virtually all the present models of attack trees disregard the possible order of elementary attacks Schneier, 1999 Mauw&Oostdijk, 2005 Buldas et al., 2006 This restriction is unrealistic The attacker can use the knowledge concerning success/failure of some elementary attacks to decide, which attacks to skip or try next Intuitively, this will allow the attacker to avoid hopeless branches, thus reducing the potential penalties and increasing the expected outcome

13 Flavors of the Serial Model Blocking vs. non-blocking In practice, there exist elementary attacks, failed attempt of which blocks the execution of the whole tree, e.g. due to imprisonment of the attacker

14 Flavors of the Serial Model Blocking vs. non-blocking In practice, there exist elementary attacks, failed attempt of which blocks the execution of the whole tree, e.g. due to imprisonment of the attacker Fully adaptive vs. semi-adaptive In reality, the attacker can freely choose the order of the next elementary attacks based on the results of already tried ones From theoretical viewpoint, this gives a superexponential explosion Hence, for an intermediate step we may limit ourselves to the model, where the attacker Fixes the order of the elementary attacks in advance Is only allowed to skip some of them or stop attacking altogether

15 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalty paid yes q Attacker caught? Attacker caught? yes q + Penalty paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +

16 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalty paid yes q Attacker caught? Attacker caught? yes q + Penalty paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +

17 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalty paid yes q Attacker caught? Attacker caught? yes q + Penalty paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +

18 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalty paid yes q Attacker caught? Attacker caught? yes q + Penalty paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +

19 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalties paid yes q Attacker caught? Attacker caught? yes q + Penalties + paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +

20 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalties paid yes q Attacker caught? Attacker caught? yes q + Penalties + paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +

21 Multi-parameter Attack Trees (Buldas et al., 2006) Gains value gained from the successful attack Cost i cost of the elementary attack, p i success probability π i = q Penalty expected penalty, unsuccessful attack π + i = q + Penalty + expected penalty, successful attack Outcome i = p i Gains Cost i p i π + i (1 p i ) π i

22 Multi-parameter Attack Trees (Buldas et al., 2006) Gains value gained from the successful attack Cost i cost of the elementary attack, p i success probability π i = q Penalty expected penalty, unsuccessful attack π + i = q + Penalty + expected penalty, successful attack Outcome i = p i Gains Cost i p i π + i For an OR-node: (1 p i ) π i { (Cost, p, π +, π (Cost1, p ) = 1, π 1 +, π 1 ), if Outcome 1 > Outcome 2 (Cost 2, p 2, π 2 +, π 2 ), if Outcome 1 Outcome 2

23 Multi-parameter Attack Trees (Buldas et al., 2006) Gains value gained from the successful attack Cost i cost of the elementary attack, p i success probability π i = q Penalty expected penalty, unsuccessful attack π + i = q + Penalty + expected penalty, successful attack Outcome i = p i Gains Cost i p i π + i For an OR-node: (1 p i ) π i { (Cost, p, π +, π (Cost1, p ) = 1, π 1 +, π 1 ), if Outcome 1 > Outcome 2 (Cost 2, p 2, π 2 +, π 2 ), if Outcome 1 Outcome 2 For an AND-node: Cost = Cost 1 + Cost 2, p = p 1 p 2, π + = π π+ 2, π = p 1(1 p 2 )(π π 2 ) + (1 p 1)p 2 (π 1 + π+ 2 ) 1 p 1 p (1 p 1)(1 p 2 )(π 1 + π 2 ) 1 p 1 p 2

24 Buldas et al., 2006: pros and cons Pros: The semantics uses several intuitively relevant parameters The semantics is very fast, works by one tree traversal in time O(n)

25 Buldas et al., 2006: pros and cons Pros: The semantics uses several intuitively relevant parameters The semantics is very fast, works by one tree traversal in time O(n) Cons: In each OR-node, Outcome needs to be computed, which needs Gains for each OR-node, but Gains only has a meaning globally The model (as most of the other previous models) assumes that exactly one descendant is picked in an OR-node The model is inconsistent with Mauw&Oostdijk 2005

26 Jürgenson & Willemson, 2008 F Boolean formula corresponding to the attack tree X set of elementary attacks σ attack suite, satisfying the root node of the attack tree

27 Jürgenson & Willemson, 2008 F Boolean formula corresponding to the attack tree X set of elementary attacks σ attack suite, satisfying the root node of the attack tree max {Outcome σ : σ X, F(σ := true) = true} σ Outcome σ = p σ Gains X i σ Expenses i Expenses i = Cost i + p i π + i + (1 p i ) π i p σ = ρ σ F(ρ:=true)=true p i X i ρ X j σ\ρ (1 p j )

28 Implementation & Results Implemented in Perl programming language, using terribly inefficient data structures p σ can be computed in linear time Going through potentially all the subsets of X still remains exponential, of course Using a modified DPLL algorithm for finding all such attack suites, which satisfy the attack tree Theorem: We don t need to consider AND nodes, where some child node is not satisfied

29 Implementation & Results Implemented in Perl programming language, using terribly inefficient data structures p σ can be computed in linear time Going through potentially all the subsets of X still remains exponential, of course Using a modified DPLL algorithm for finding all such attack suites, which satisfy the attack tree Theorem: We don t need to consider AND nodes, where some child node is not satisfied Outcome JW08 Outcome B+06 If T 1 T 2 then Outcome(T 1 ) = Outcome(T 2 )

30 Average running time in seconds, logarithmic scale Figure 2. Performance test results Number of leaves in a tree

31 Figure Comparison 3. Precision of the computational with Buldas routineet of Buldas al., et 2006 al. [10] Number of trees Found the same attack suite Number of trees Number of leaves in a tree

32 Jürgenson & Willemson, 2010 Reimplementation of Jürgenson & Willemson, 2008 C++ instead of Perl Removing unnecessary DPLL overhead (e.g. transformation to CNF) Bit vectors instead of classes representing sets of subsets Catching true&false as soon as it occurs Implementing better strategies for choosing undefined literals Most-AND and Weighted-AND Heuristic complexity of the resulting algorithm: O(1.71 n ) The best #SAT -solver works in time O( n ) Fast approximation using a custom genetic algorithm At least 89% accuracy within 2 seconds for the trees with less than 30 leaves

33 Fig. 1. Performance test results Comparing Strategies Average running time in seconds, logarithmic scale random strategy weighted-2-and strategy weighted-0.5-and strategy weighted-1-and strategy O(1.71 n ) Number of leaves in the tree

34 Fig. 2. Accuracy of genetics algorithm with p =2n and g =2n Accuracy of the Genetic Algorithm 1 Accuracy of the genetics results Number of leaves in the tree

35 Jürgenson & Willemson, 2009 Introduction of the serial model Semi-adaptive, non-blocking case, i.e. The attacker fixes the order of the elementary attacks in advance He is allowed to skip the elementary attacks that have become useless No failure blocks the entire execution

36 Attacker s Choices & Decrypt company secrets Obtain encrypted file & Obtain the password Bribe sysadmin Hack system Steal backup Install keylogger t

37 Outcome in the Serial Model (I) The expected outcome of the attack based on permutation α is Outcome α = p α Gains p α,i Expenses i, X i X where p α is the success probability of the primary threat and p α,i denotes the probability that the node X i

38 Outcome in the Serial Model (I) The expected outcome of the attack based on permutation α is Outcome α = p α Gains p α,i Expenses i, X i X where p α is the success probability of the primary threat and p α,i denotes the probability that the node X i Theorem Let F 1 and F 2 be two monotone Boolean formulae such that F 1 F 2, and let Outcome 1 α and Outcome 2 α be the expected outcomes obtained running the algorithm on the corresponding formulae using the leaf set permutation α. Then Outcome 1 α = Outcome 2 α.

39 Outcome in the Serial Model (II) Theorem We have Outcome JW09 Outcome JW08. If for all the elementary attacks X i (i = 1,..., n) one also has Expenses i > 0, then strict inequality holds in the above inequality.

40 Outcome in the Serial Model (II) Theorem We have Outcome JW09 Outcome JW08. If for all the elementary attacks X i (i = 1,..., n) one also has Expenses i > 0, then strict inequality holds in the above inequality. The naïve algorithm for computing the attacker s outcome is average-case exponential in the number of leaves n We propose an efficient algorithm with complexity O(n 2 ) Recall, need only the quantities p α and p α,i

41 The Algorithm & t = 0 f = 1 p 2 u = p 2 t = p 1 f = 0 u = 1 p 1 & t = 0 f = 1 p 2 u = p 2 X 1 t = p 1 f = 1 p 1 u = 0 X 2 t = p 2 f = 1 p 2 u = 0 p α,3 = (1 p 1 ) (1 (1 p 2 )) X 3 t = 0 f = 0 u = 1 X 4 t = 0 f = 0 u = 1 t

42 Sequential model revised Jürgenson&Willemson, 2009, builds on another framework: The attacker tries to first, maximize success probability second, achieve the best possible outcome Hence, a certain form of irrational behavior is obtained

43 Sequential model revised Jürgenson&Willemson, 2009, builds on another framework: The attacker tries to first, maximize success probability second, achieve the best possible outcome Hence, a certain form of irrational behavior is obtained Niitsoo, 2010 analyzes the rational case Builds on classical decision theory Attacks can be skipped if they are too expensive Otherwise same as JW09 Order of attacks fixed before the attack Full information about the past

44 Sequential model computation Decision tree optimization algorithm Decision trees usually exponential in general Attack trees provide for a simple structure We do not optimize Trees but BDD-s Non-crossing orders optimized in O(n) time. Modeling goal-oriented behavior Optimal non-crossing order for JW10 can be found in O(n lg n) time (Niitsoo, 2010)

45 Fully rational model Pros: Fully rational behavior (easy to justify) Optimal subset found automatically Highest expected utility of all models to date Efficient O(n) computation for some orders Highly extensible: Blocking case (even partial blocking) Bribes and uncertainty Intermediate payments Cons: Computation exponential for some orders Still only semi-adaptive Conventional

Upper Bounds for Adversaries Utility in Attack Trees

Upper Bounds for Adversaries Utility in Attack Trees Upper Bounds for Adversaries Utility in Attack Trees Ahto Buldas 1,2,3, and Roman Stepanenko 2 1 Cybernetica AS 2 Tallinn University of Technology 3 Guardtime AS Abstract. Attack trees model the decision

More information

Automated Program Verification and Testing 15414/15614 Fall 2016 Lecture 3: Practical SAT Solving

Automated Program Verification and Testing 15414/15614 Fall 2016 Lecture 3: Practical SAT Solving Automated Program Verification and Testing 15414/15614 Fall 2016 Lecture 3: Practical SAT Solving Matt Fredrikson mfredrik@cs.cmu.edu October 17, 2016 Matt Fredrikson SAT Solving 1 / 36 Review: Propositional

More information

COMP219: Artificial Intelligence. Lecture 20: Propositional Reasoning

COMP219: Artificial Intelligence. Lecture 20: Propositional Reasoning COMP219: Artificial Intelligence Lecture 20: Propositional Reasoning 1 Overview Last time Logic for KR in general; Propositional Logic; Natural Deduction Today Entailment, satisfiability and validity Normal

More information

The Class NP. NP is the problems that can be solved in polynomial time by a nondeterministic machine.

The Class NP. NP is the problems that can be solved in polynomial time by a nondeterministic machine. The Class NP NP is the problems that can be solved in polynomial time by a nondeterministic machine. NP The time taken by nondeterministic TM is the length of the longest branch. The collection of all

More information

an information-theoretic model for adaptive side-channel attacks

an information-theoretic model for adaptive side-channel attacks an information-theoretic model for adaptive side-channel attacks Boris Köpf, David Basin ETH Zurich, Switzerland successful side-channel attacks Attacker must be able to extract information about the key

More information

Price: $25 (incl. T-Shirt, morning tea and lunch) Visit:

Price: $25 (incl. T-Shirt, morning tea and lunch) Visit: Three days of interesting talks & workshops from industry experts across Australia Explore new computing topics Network with students & employers in Brisbane Price: $25 (incl. T-Shirt, morning tea and

More information

Problem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26

Problem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Binary Search Introduction Problem Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Strategy 1: Random Search Randomly select a page until the page containing

More information

Lecture December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about

Lecture December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about 0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 7 02 December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about Two-Player zero-sum games (min-max theorem) Mixed

More information

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University Algorithms NP -Complete Problems Dong Kyue Kim Hanyang University dqkim@hanyang.ac.kr The Class P Definition 13.2 Polynomially bounded An algorithm is said to be polynomially bounded if its worst-case

More information

Logic in Automatic Verification

Logic in Automatic Verification Logic in Automatic Verification Javier Esparza Sofware Reliability and Security Group Institute for Formal Methods in Computer Science University of Stuttgart Many thanks to Abdelwaheb Ayari, David Basin,

More information

Limitations of Algorithm Power

Limitations of Algorithm Power Limitations of Algorithm Power Objectives We now move into the third and final major theme for this course. 1. Tools for analyzing algorithms. 2. Design strategies for designing algorithms. 3. Identifying

More information

Computational Logic. Davide Martinenghi. Spring Free University of Bozen-Bolzano. Computational Logic Davide Martinenghi (1/30)

Computational Logic. Davide Martinenghi. Spring Free University of Bozen-Bolzano. Computational Logic Davide Martinenghi (1/30) Computational Logic Davide Martinenghi Free University of Bozen-Bolzano Spring 2010 Computational Logic Davide Martinenghi (1/30) Propositional Logic - sequent calculus To overcome the problems of natural

More information

Speculative Parallelism in Cilk++

Speculative Parallelism in Cilk++ Speculative Parallelism in Cilk++ Ruben Perez & Gregory Malecha MIT May 11, 2010 Ruben Perez & Gregory Malecha (MIT) Speculative Parallelism in Cilk++ May 11, 2010 1 / 33 Parallelizing Embarrassingly Parallel

More information

6. Logical Inference

6. Logical Inference Artificial Intelligence 6. Logical Inference Prof. Bojana Dalbelo Bašić Assoc. Prof. Jan Šnajder University of Zagreb Faculty of Electrical Engineering and Computing Academic Year 2016/2017 Creative Commons

More information

Lecture 20: conp and Friends, Oracles in Complexity Theory

Lecture 20: conp and Friends, Oracles in Complexity Theory 6.045 Lecture 20: conp and Friends, Oracles in Complexity Theory 1 Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode:

More information

Chapter 2. Reductions and NP. 2.1 Reductions Continued The Satisfiability Problem (SAT) SAT 3SAT. CS 573: Algorithms, Fall 2013 August 29, 2013

Chapter 2. Reductions and NP. 2.1 Reductions Continued The Satisfiability Problem (SAT) SAT 3SAT. CS 573: Algorithms, Fall 2013 August 29, 2013 Chapter 2 Reductions and NP CS 573: Algorithms, Fall 2013 August 29, 2013 2.1 Reductions Continued 2.1.1 The Satisfiability Problem SAT 2.1.1.1 Propositional Formulas Definition 2.1.1. Consider a set of

More information

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet. CS 188 Fall 2015 Introduction to Artificial Intelligence Final You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

More information

Lecture Notes on SAT Solvers & DPLL

Lecture Notes on SAT Solvers & DPLL 15-414: Bug Catching: Automated Program Verification Lecture Notes on SAT Solvers & DPLL Matt Fredrikson André Platzer Carnegie Mellon University Lecture 10 1 Introduction In this lecture we will switch

More information

Exact and Approximate Equilibria for Optimal Group Network Formation

Exact and Approximate Equilibria for Optimal Group Network Formation Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich and Bugra Caskurlu Computer Science Department, RPI, 110 8th Street, Troy, NY 12180 {eanshel,caskub}@cs.rpi.edu Abstract.

More information

Lecture 11: Non-Interactive Zero-Knowledge II. 1 Non-Interactive Zero-Knowledge in the Hidden-Bits Model for the Graph Hamiltonian problem

Lecture 11: Non-Interactive Zero-Knowledge II. 1 Non-Interactive Zero-Knowledge in the Hidden-Bits Model for the Graph Hamiltonian problem CS 276 Cryptography Oct 8, 2014 Lecture 11: Non-Interactive Zero-Knowledge II Instructor: Sanjam Garg Scribe: Rafael Dutra 1 Non-Interactive Zero-Knowledge in the Hidden-Bits Model for the Graph Hamiltonian

More information

6.841/18.405J: Advanced Complexity Wednesday, February 12, Lecture Lecture 3

6.841/18.405J: Advanced Complexity Wednesday, February 12, Lecture Lecture 3 6.841/18.405J: Advanced Complexity Wednesday, February 12, 2003 Lecture Lecture 3 Instructor: Madhu Sudan Scribe: Bobby Kleinberg 1 The language MinDNF At the end of the last lecture, we introduced the

More information

Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions

Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions Yair Yona, and Suhas Diggavi, Fellow, IEEE Abstract arxiv:608.0232v4 [cs.cr] Jan 207 In this work we analyze the average

More information

IE418 Integer Programming

IE418 Integer Programming IE418: Integer Programming Department of Industrial and Systems Engineering Lehigh University 2nd February 2005 Boring Stuff Extra Linux Class: 8AM 11AM, Wednesday February 9. Room??? Accounts and Passwords

More information

Algorithmic Game Theory and Applications. Lecture 5: Introduction to Linear Programming

Algorithmic Game Theory and Applications. Lecture 5: Introduction to Linear Programming Algorithmic Game Theory and Applications Lecture 5: Introduction to Linear Programming Kousha Etessami real world example : the diet problem You are a fastidious eater. You want to make sure that every

More information

Tutorial: Device-independent random number generation. Roger Colbeck University of York

Tutorial: Device-independent random number generation. Roger Colbeck University of York Tutorial: Device-independent random number generation Roger Colbeck University of York Outline Brief motivation of random number generation Discuss what we mean by a random number Discuss some ways of

More information

DRAFT. Algebraic computation models. Chapter 14

DRAFT. Algebraic computation models. Chapter 14 Chapter 14 Algebraic computation models Somewhat rough We think of numerical algorithms root-finding, gaussian elimination etc. as operating over R or C, even though the underlying representation of the

More information

Introduction to Cryptography Lecture 13

Introduction to Cryptography Lecture 13 Introduction to Cryptography Lecture 13 Benny Pinkas June 5, 2011 Introduction to Cryptography, Benny Pinkas page 1 Electronic cash June 5, 2011 Introduction to Cryptography, Benny Pinkas page 2 Simple

More information

Learning Decision Trees

Learning Decision Trees Learning Decision Trees Machine Learning Fall 2018 Some slides from Tom Mitchell, Dan Roth and others 1 Key issues in machine learning Modeling How to formulate your problem as a machine learning problem?

More information

Satisifiability and Probabilistic Satisifiability

Satisifiability and Probabilistic Satisifiability Satisifiability and Probabilistic Satisifiability Department of Computer Science Instituto de Matemática e Estatística Universidade de São Paulo 2010 Topics Next Issue The SAT Problem The Centrality of

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 9 February 6, 2012 CPSC 467b, Lecture 9 1/53 Euler s Theorem Generating RSA Modulus Finding primes by guess and check Density of

More information

Unit 1A: Computational Complexity

Unit 1A: Computational Complexity Unit 1A: Computational Complexity Course contents: Computational complexity NP-completeness Algorithmic Paradigms Readings Chapters 3, 4, and 5 Unit 1A 1 O: Upper Bounding Function Def: f(n)= O(g(n)) if

More information

COMP3702/7702 Artificial Intelligence Week 5: Search in Continuous Space with an Application in Motion Planning " Hanna Kurniawati"

COMP3702/7702 Artificial Intelligence Week 5: Search in Continuous Space with an Application in Motion Planning  Hanna Kurniawati COMP3702/7702 Artificial Intelligence Week 5: Search in Continuous Space with an Application in Motion Planning " Hanna Kurniawati" Last week" Main components of PRM" Collision check for a configuration"

More information

Computational Complexity and Intractability: An Introduction to the Theory of NP. Chapter 9

Computational Complexity and Intractability: An Introduction to the Theory of NP. Chapter 9 1 Computational Complexity and Intractability: An Introduction to the Theory of NP Chapter 9 2 Objectives Classify problems as tractable or intractable Define decision problems Define the class P Define

More information

Lecture 21: Algebraic Computation Models

Lecture 21: Algebraic Computation Models princeton university cos 522: computational complexity Lecture 21: Algebraic Computation Models Lecturer: Sanjeev Arora Scribe:Loukas Georgiadis We think of numerical algorithms root-finding, gaussian

More information

Probabilistic Assessment of Security Scenarios Challenges and Solutions

Probabilistic Assessment of Security Scenarios Challenges and Solutions Probabilistic Assessment of Security Scenarios Challenges and Solutions Barbara Kordy Joint work with Marc Pouly, Patrick Schweitzer Formal Methods and Security seminar INRIA Rennes, May 16, 2014 Barbara

More information

Chapter 7 R&N ICS 271 Fall 2017 Kalev Kask

Chapter 7 R&N ICS 271 Fall 2017 Kalev Kask Set 6: Knowledge Representation: The Propositional Calculus Chapter 7 R&N ICS 271 Fall 2017 Kalev Kask Outline Representing knowledge using logic Agent that reason logically A knowledge based agent Representing

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 10 February 19, 2013 CPSC 467b, Lecture 10 1/45 Primality Tests Strong primality tests Weak tests of compositeness Reformulation

More information

FINAL EXAM: FALL 2013 CS 6375 INSTRUCTOR: VIBHAV GOGATE

FINAL EXAM: FALL 2013 CS 6375 INSTRUCTOR: VIBHAV GOGATE FINAL EXAM: FALL 2013 CS 6375 INSTRUCTOR: VIBHAV GOGATE You are allowed a two-page cheat sheet. You are also allowed to use a calculator. Answer the questions in the spaces provided on the question sheets.

More information

Computer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms

Computer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms Computer Science 385 Analysis of Algorithms Siena College Spring 2011 Topic Notes: Limitations of Algorithms We conclude with a discussion of the limitations of the power of algorithms. That is, what kinds

More information

CS 6375 Machine Learning

CS 6375 Machine Learning CS 6375 Machine Learning Decision Trees Instructor: Yang Liu 1 Supervised Classifier X 1 X 2. X M Ref class label 2 1 Three variables: Attribute 1: Hair = {blond, dark} Attribute 2: Height = {tall, short}

More information

Lecture 2: Symbolic Model Checking With SAT

Lecture 2: Symbolic Model Checking With SAT Lecture 2: Symbolic Model Checking With SAT Edmund M. Clarke, Jr. School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 (Joint work over several years with: A. Biere, A. Cimatti, Y.

More information

Solvers for the Problem of Boolean Satisfiability (SAT) Will Klieber Aug 31, 2011

Solvers for the Problem of Boolean Satisfiability (SAT) Will Klieber Aug 31, 2011 Solvers for the Problem of Boolean Satisfiability (SAT) Will Klieber 15-414 Aug 31, 2011 Why study SAT solvers? Many problems reduce to SAT. Formal verification CAD, VLSI Optimization AI, planning, automated

More information

Lecture 7: ElGamal and Discrete Logarithms

Lecture 7: ElGamal and Discrete Logarithms Lecture 7: ElGamal and Discrete Logarithms Johan Håstad, transcribed by Johan Linde 2006-02-07 1 The discrete logarithm problem Recall that a generator g of a group G is an element of order n such that

More information

Intelligent Agents. Formal Characteristics of Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University

Intelligent Agents. Formal Characteristics of Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University Intelligent Agents Formal Characteristics of Planning Ute Schmid Cognitive Systems, Applied Computer Science, Bamberg University Extensions to the slides for chapter 3 of Dana Nau with contributions by

More information

Optimization and Complexity

Optimization and Complexity Optimization and Complexity Decision Systems Group Brigham and Women s Hospital, Harvard Medical School Harvard-MIT Division of Health Sciences and Technology Aim Give you an intuition of what is meant

More information

Model Checking with CTL. Presented by Jason Simas

Model Checking with CTL. Presented by Jason Simas Model Checking with CTL Presented by Jason Simas Model Checking with CTL Based Upon: Logic in Computer Science. Huth and Ryan. 2000. (148-215) Model Checking. Clarke, Grumberg and Peled. 1999. (1-26) Content

More information

1 Introduction (January 21)

1 Introduction (January 21) CS 97: Concrete Models of Computation Spring Introduction (January ). Deterministic Complexity Consider a monotonically nondecreasing function f : {,,..., n} {, }, where f() = and f(n) =. We call f a step

More information

Midterm 2. Your Exam Room: Name of Person Sitting on Your Left: Name of Person Sitting on Your Right: Name of Person Sitting in Front of You:

Midterm 2. Your Exam Room: Name of Person Sitting on Your Left: Name of Person Sitting on Your Right: Name of Person Sitting in Front of You: CS70 Discrete Mathematics and Probability Theory, Fall 2018 Midterm 2 8:00-10:00pm, 31 October Your First Name: SIGN Your Name: Your Last Name: Your SID Number: Your Exam Room: Name of Person Sitting on

More information

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT 1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations

More information

INAPPROX APPROX PTAS. FPTAS Knapsack P

INAPPROX APPROX PTAS. FPTAS Knapsack P CMPSCI 61: Recall From Last Time Lecture 22 Clique TSP INAPPROX exists P approx alg for no ε < 1 VertexCover MAX SAT APPROX TSP some but not all ε< 1 PTAS all ε < 1 ETSP FPTAS Knapsack P poly in n, 1/ε

More information

A Mathematical Theory of Communication

A Mathematical Theory of Communication A Mathematical Theory of Communication Ben Eggers Abstract This paper defines information-theoretic entropy and proves some elementary results about it. Notably, we prove that given a few basic assumptions

More information

Quantitative Verification and Synthesis of Attack-Defence Scenarios

Quantitative Verification and Synthesis of Attack-Defence Scenarios Quantitative Verification and Synthesis of Attack-Defence Scenarios Zaruhi Aslanyan, Flemming Nielson DTU Compute Technical University of Denmark Denmark Email: {zaas,fnie}@dtu.dk David Parker School of

More information

Notes for Lecture 21

Notes for Lecture 21 U.C. Berkeley CS170: Intro to CS Theory Handout N21 Professor Luca Trevisan November 20, 2001 Notes for Lecture 21 1 Tractable and Intractable Problems So far, almost all of the problems that we have studied

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

Critical Reading of Optimization Methods for Logical Inference [1]

Critical Reading of Optimization Methods for Logical Inference [1] Critical Reading of Optimization Methods for Logical Inference [1] Undergraduate Research Internship Department of Management Sciences Fall 2007 Supervisor: Dr. Miguel Anjos UNIVERSITY OF WATERLOO Rajesh

More information

Automata Theory CS Complexity Theory I: Polynomial Time

Automata Theory CS Complexity Theory I: Polynomial Time Automata Theory CS411-2015-17 Complexity Theory I: Polynomial Time David Galles Department of Computer Science University of San Francisco 17-0: Tractable vs. Intractable If a problem is recursive, then

More information

Multiparty Computation (MPC) Arpita Patra

Multiparty Computation (MPC) Arpita Patra Multiparty Computation (MPC) Arpita Patra MPC offers more than Traditional Crypto! > MPC goes BEYOND traditional Crypto > Models the distributed computing applications that simultaneously demands usability

More information

Computational Complexity Theory

Computational Complexity Theory Computational Complexity Theory Marcus Hutter Canberra, ACT, 0200, Australia http://www.hutter1.net/ Assumed Background Preliminaries Turing Machine (TM) Deterministic Turing Machine (DTM) NonDeterministic

More information

Computability and Complexity Theory: An Introduction

Computability and Complexity Theory: An Introduction Computability and Complexity Theory: An Introduction meena@imsc.res.in http://www.imsc.res.in/ meena IMI-IISc, 20 July 2006 p. 1 Understanding Computation Kinds of questions we seek answers to: Is a given

More information

Exact and Approximate Equilibria for Optimal Group Network Formation

Exact and Approximate Equilibria for Optimal Group Network Formation Noname manuscript No. will be inserted by the editor) Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich Bugra Caskurlu Received: December 2009 / Accepted: Abstract

More information

Propositional Logic. Methods & Tools for Software Engineering (MTSE) Fall Prof. Arie Gurfinkel

Propositional Logic. Methods & Tools for Software Engineering (MTSE) Fall Prof. Arie Gurfinkel Propositional Logic Methods & Tools for Software Engineering (MTSE) Fall 2017 Prof. Arie Gurfinkel References Chpater 1 of Logic for Computer Scientists http://www.springerlink.com/content/978-0-8176-4762-9/

More information

Foundations of Artificial Intelligence

Foundations of Artificial Intelligence Foundations of Artificial Intelligence 31. Propositional Logic: DPLL Algorithm Malte Helmert and Gabriele Röger University of Basel April 24, 2017 Propositional Logic: Overview Chapter overview: propositional

More information

NP-complete problems. CSE 101: Design and Analysis of Algorithms Lecture 20

NP-complete problems. CSE 101: Design and Analysis of Algorithms Lecture 20 NP-complete problems CSE 101: Design and Analysis of Algorithms Lecture 20 CSE 101: Design and analysis of algorithms NP-complete problems Reading: Chapter 8 Homework 7 is due today, 11:59 PM Tomorrow

More information

POLYNOMIAL SPACE QSAT. Games. Polynomial space cont d

POLYNOMIAL SPACE QSAT. Games. Polynomial space cont d T-79.5103 / Autumn 2008 Polynomial Space 1 T-79.5103 / Autumn 2008 Polynomial Space 3 POLYNOMIAL SPACE Polynomial space cont d Polynomial space-bounded computation has a variety of alternative characterizations

More information

#A32 INTEGERS 10 (2010), TWO NEW VAN DER WAERDEN NUMBERS: w(2; 3, 17) AND w(2; 3, 18)

#A32 INTEGERS 10 (2010), TWO NEW VAN DER WAERDEN NUMBERS: w(2; 3, 17) AND w(2; 3, 18) #A32 INTEGERS 10 (2010), 369-377 TWO NEW VAN DER WAERDEN NUMBERS: w(2; 3, 17) AND w(2; 3, 18) Tanbir Ahmed ConCoCO Research Laboratory, Department of Computer Science and Software Engineering, Concordia

More information

P P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions

P P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions Summary of the previous lecture Recall that we mentioned the following topics: P: is the set of decision problems (or languages) that are solvable in polynomial time. NP: is the set of decision problems

More information

CS6375: Machine Learning Gautam Kunapuli. Decision Trees

CS6375: Machine Learning Gautam Kunapuli. Decision Trees Gautam Kunapuli Example: Restaurant Recommendation Example: Develop a model to recommend restaurants to users depending on their past dining experiences. Here, the features are cost (x ) and the user s

More information

SAT Solvers: Theory and Practice

SAT Solvers: Theory and Practice Summer School on Verification Technology, Systems & Applications, September 17, 2008 p. 1/98 SAT Solvers: Theory and Practice Clark Barrett barrett@cs.nyu.edu New York University Summer School on Verification

More information

Towards a General Theory of Non-Cooperative Computation

Towards a General Theory of Non-Cooperative Computation Towards a General Theory of Non-Cooperative Computation (Extended Abstract) Robert McGrew, Ryan Porter, and Yoav Shoham Stanford University {bmcgrew,rwporter,shoham}@cs.stanford.edu Abstract We generalize

More information

CS 5114: Theory of Algorithms. Tractable Problems. Tractable Problems (cont) Decision Problems. Clifford A. Shaffer. Spring 2014

CS 5114: Theory of Algorithms. Tractable Problems. Tractable Problems (cont) Decision Problems. Clifford A. Shaffer. Spring 2014 Department of Computer Science Virginia Tech Blacksburg, Virginia Copyright c 2014 by Clifford A. Shaffer : Theory of Algorithms Title page : Theory of Algorithms Clifford A. Shaffer Spring 2014 Clifford

More information

NP Completeness. CS 374: Algorithms & Models of Computation, Spring Lecture 23. November 19, 2015

NP Completeness. CS 374: Algorithms & Models of Computation, Spring Lecture 23. November 19, 2015 CS 374: Algorithms & Models of Computation, Spring 2015 NP Completeness Lecture 23 November 19, 2015 Chandra & Lenny (UIUC) CS374 1 Spring 2015 1 / 37 Part I NP-Completeness Chandra & Lenny (UIUC) CS374

More information

Analysis of Algorithms. Unit 5 - Intractable Problems

Analysis of Algorithms. Unit 5 - Intractable Problems Analysis of Algorithms Unit 5 - Intractable Problems 1 Intractable Problems Tractable Problems vs. Intractable Problems Polynomial Problems NP Problems NP Complete and NP Hard Problems 2 In this unit we

More information

Boolean decision diagrams and SAT-based representations

Boolean decision diagrams and SAT-based representations Boolean decision diagrams and SAT-based representations 4th July 200 So far we have seen Kripke Structures 2 Temporal logics (and their semantics over Kripke structures) 3 Model checking of these structures

More information

Today: Linear Programming (con t.)

Today: Linear Programming (con t.) Today: Linear Programming (con t.) COSC 581, Algorithms April 10, 2014 Many of these slides are adapted from several online sources Reading Assignments Today s class: Chapter 29.4 Reading assignment for

More information

Limits of Feasibility. Example. Complexity Relationships among Models. 1. Complexity Relationships among Models

Limits of Feasibility. Example. Complexity Relationships among Models. 1. Complexity Relationships among Models Limits of Feasibility Wolfgang Schreiner Wolfgang.Schreiner@risc.jku.at Research Institute for Symbolic Computation (RISC) Johannes Kepler University, Linz, Austria http://www.risc.jku.at 1. Complexity

More information

A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees 1 / 35 A Stochastic Framework for Quantitative Analysis of R. Jhawar K. Lounis S. Mauw CSC/SnT University of Luxembourg Luxembourg Security and Trust of Software Systems, 2016 ADT2P & TREsPASS Project

More information

SAT, NP, NP-Completeness

SAT, NP, NP-Completeness CS 473: Algorithms, Spring 2018 SAT, NP, NP-Completeness Lecture 22 April 13, 2018 Most slides are courtesy Prof. Chekuri Ruta (UIUC) CS473 1 Spring 2018 1 / 57 Part I Reductions Continued Ruta (UIUC)

More information

A An Overview of Complexity Theory for the Algorithm Designer

A An Overview of Complexity Theory for the Algorithm Designer A An Overview of Complexity Theory for the Algorithm Designer A.1 Certificates and the class NP A decision problem is one whose answer is either yes or no. Two examples are: SAT: Given a Boolean formula

More information

Harvard CS 121 and CSCI E-121 Lecture 22: The P vs. NP Question and NP-completeness

Harvard CS 121 and CSCI E-121 Lecture 22: The P vs. NP Question and NP-completeness Harvard CS 121 and CSCI E-121 Lecture 22: The P vs. NP Question and NP-completeness Harry Lewis November 19, 2013 Reading: Sipser 7.4, 7.5. For culture : Computers and Intractability: A Guide to the Theory

More information

SMT Unsat Core Minimization

SMT Unsat Core Minimization SMT Unsat Core Minimization O F E R G U T H M A N N, O F E R S T R I C H M A N, A N N A T R O S TA N E T S K I F M C A D 2 0 1 6 1 Satisfiability Modulo Theories Satisfiability Modulo Theories (SMT): decides

More information

Synthesis of Designs from Property Specifications

Synthesis of Designs from Property Specifications Synthesis of Designs from Property Specifications Amir Pnueli New York University and Weizmann Institute of Sciences FMCAD 06 San Jose, November, 2006 Joint work with Nir Piterman, Yaniv Sa ar, Research

More information

CS21 Decidability and Tractability

CS21 Decidability and Tractability CS21 Decidability and Tractability Lecture 18 February 16, 2018 February 16, 2018 CS21 Lecture 18 1 Outline the complexity class NP 3-SAT is NP-complete NP-complete problems: independent set, vertex cover,

More information

Umans Complexity Theory Lectures

Umans Complexity Theory Lectures Umans Complexity Theory Lectures Lecture 12: The Polynomial-Time Hierarchy Oracle Turing Machines Oracle Turing Machine (OTM): Deterministic multitape TM M with special query tape special states q?, q

More information

Heuristics for Efficient SAT Solving. As implemented in GRASP, Chaff and GSAT.

Heuristics for Efficient SAT Solving. As implemented in GRASP, Chaff and GSAT. Heuristics for Efficient SAT Solving As implemented in GRASP, Chaff and GSAT. Formulation of famous problems as SAT: k-coloring (1/2) The K-Coloring problem: Given an undirected graph G(V,E) and a natural

More information

An instance of SAT is defined as (X, S)

An instance of SAT is defined as (X, S) SAT: Propositional Satisfiability 22c:45 Artificial Intelligence Russell & Norvig, Ch. 7.6 Validity vs. Satisfiability Validity: A sentence is valid if it is true in every interpretation (every interpretation

More information

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012 Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Search and Lookahead Enforcing consistency is one way of solving constraint networks:

More information

Recoverable Robustness in Scheduling Problems

Recoverable Robustness in Scheduling Problems Master Thesis Computing Science Recoverable Robustness in Scheduling Problems Author: J.M.J. Stoef (3470997) J.M.J.Stoef@uu.nl Supervisors: dr. J.A. Hoogeveen J.A.Hoogeveen@uu.nl dr. ir. J.M. van den Akker

More information

Fully Homomorphic Encryption and Bootstrapping

Fully Homomorphic Encryption and Bootstrapping Fully Homomorphic Encryption and Bootstrapping Craig Gentry and Shai Halevi June 3, 2014 China Summer School on Lattices and Cryptography Fully Homomorphic Encryption (FHE) A FHE scheme can evaluate unbounded

More information

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single

More information

Column Generation. i = 1,, 255;

Column Generation. i = 1,, 255; Column Generation The idea of the column generation can be motivated by the trim-loss problem: We receive an order to cut 50 pieces of.5-meter (pipe) segments, 250 pieces of 2-meter segments, and 200 pieces

More information

A survey on quantum-secure cryptographic systems

A survey on quantum-secure cryptographic systems A survey on quantum-secure cryptographic systems Tomoka Kan May 24, 2018 1 Abstract Post-quantum cryptography refers to the search for classical cryptosystems which remain secure in the presence of a quantum

More information

COMP Analysis of Algorithms & Data Structures

COMP Analysis of Algorithms & Data Structures COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Computational Complexity CLRS 34.1-34.4 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 50 Polynomial

More information

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies SOBER Cryptanalysis Daniel Bleichenbacher and Sarvar Patel {bleichen,sarvar}@lucent.com Bell Laboratories Lucent Technologies Abstract. SOBER is a new stream cipher that has recently been developed by

More information

Essential facts about NP-completeness:

Essential facts about NP-completeness: CMPSCI611: NP Completeness Lecture 17 Essential facts about NP-completeness: Any NP-complete problem can be solved by a simple, but exponentially slow algorithm. We don t have polynomial-time solutions

More information

Propositional Logic: Models and Proofs

Propositional Logic: Models and Proofs Propositional Logic: Models and Proofs C. R. Ramakrishnan CSE 505 1 Syntax 2 Model Theory 3 Proof Theory and Resolution Compiled at 11:51 on 2016/11/02 Computing with Logic Propositional Logic CSE 505

More information

Lecture 2 Propositional Logic & SAT

Lecture 2 Propositional Logic & SAT CS 5110/6110 Rigorous System Design Spring 2017 Jan-17 Lecture 2 Propositional Logic & SAT Zvonimir Rakamarić University of Utah Announcements Homework 1 will be posted soon Propositional logic: Chapter

More information

Decision Procedures for Satisfiability and Validity in Propositional Logic

Decision Procedures for Satisfiability and Validity in Propositional Logic Decision Procedures for Satisfiability and Validity in Propositional Logic Meghdad Ghari Institute for Research in Fundamental Sciences (IPM) School of Mathematics-Isfahan Branch Logic Group http://math.ipm.ac.ir/isfahan/logic-group.htm

More information

Bayesian networks in Mastermind

Bayesian networks in Mastermind Bayesian networks in Mastermind Jiří Vomlel http://www.utia.cas.cz/vomlel/ Laboratory for Intelligent Systems Inst. of Inf. Theory and Automation University of Economics Academy of Sciences Ekonomická

More information

Synthesis of 2-level Logic Exact and Heuristic Methods. Two Approaches

Synthesis of 2-level Logic Exact and Heuristic Methods. Two Approaches Synthesis of 2-level Logic Exact and Heuristic Methods Lecture 7: Branch & Bound Exact Two Approaches Find all primes Find a complete sum Find a minimum cover (covering problem) Heuristic Take an initial

More information

Hardness of Mastermind

Hardness of Mastermind Giovanni Viglietta Department of Computer Science, University of Pisa, Italy Pisa - January 19 th, 2011 Easy to learn. Easy to play. But not so easy to win. Mastermind commercial, 1981 Mastermind is played

More information