Students who don’t understand information flow should be eaten: An experience paper

Roya Ensafi, Mike Jacobi, Jedidiah R. Crandall

Research output: Contribution to conferencePaperpeer-review

6 Scopus citations

Abstract

Information flow is still relevant, from browser privacy to side-channel attacks on cryptography. However, many of the seminal ideas come from an era when multi-level secure systems were the main subject of study. Students have a hard time relating the material to today’s familiar commodity systems. We describe our experiences developing and utilizing an online version of the game Werewolves of Miller’s Hollow (a variant of Mafia). To avoid being eaten, students must exploit inference channels on a Linux system to discover “werewolves” among a population of “townspeople.” Because the werewolves must secretly discuss and vote about who they want to eat at night, they are forced to have some amount of keystroke and network activity in their remote shells at this time. In each instance of the game the werewolves are chosen at random from among the townspeople, creating an interesting dynamic where students must think about information flow from both perspectives and keep adapting their techniques and strategies throughout the semester. This game has engendered a great deal of enthusiasm among our students, and we have witnessed many interesting attacks that we did not anticipate. We plan to release the game under an open source software license.

Original languageEnglish (US)
StatePublished - 2012
Externally publishedYes
Event5th Workshop on Cyber Security Experimentation and Test, CSET 2012 - Bellevue, United States
Duration: Aug 6 2012 → …

Conference

Conference5th Workshop on Cyber Security Experimentation and Test, CSET 2012
Country/TerritoryUnited States
CityBellevue
Period8/6/12 → …

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Students who don’t understand information flow should be eaten: An experience paper'. Together they form a unique fingerprint.

Cite this