[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3337722.3337744acmotherconferencesArticle/Chapter ViewAbstractPublication PagesfdgConference Proceedingsconference-collections
research-article

Wait a second: playing Hanabi without giving hints

Published: 26 August 2019 Publication History

Abstract

Hanabi is a cooperative card game in which communication plays a key role. The game provides an interesting challenge for AI agents, because the game state is only partially observable, and the game limits what players can tell each other. This limit on communication channels is similar to a common scenario in system security research, and has been researched extensively in that context, for example by bypassing a system's isolation by establishing a covert communication channel. Such channels can be established through anything that the sending party can influence and the receiving party can observe, such as photonic emission, resource contention, or latency. In this paper, we present Hanabi agents that utilize timing as a covert channel so effectively that they can eschew the communicative actions provided by the game entirely. In addition to a thorough evaluation of the effectiveness of our approach, and a comparison to other Hanabi agents, we provide its context in the area of security, and an outlook on how it could be related to human behavior in future work.

References

[1]
Kamran Ahsan and Deepa Kundur. 2002. Practical data hiding in TCP/IP. In Workshop on Multimedia Security at ACM Multimedia.
[2]
Aslan Askarov, Danfeng Zhang, and Andrew C Myers. 2010. Predictive black-box mitigation of timing channels. In ACM Conference on Computer and Communications Security.
[3]
Amittai Aviram, Sen Hu, Bryan Ford, and Ramakrishna Gummadi. 2010. Determinating timing channels in compute clouds. In ACM Cloud Computing Security Workshop.
[4]
Antoine Bauza. 2010. Hanabi. https://boardgamegeek.com/boardgame/98778/hanabi
[5]
Vincent Berk, Annarita Giani, George Cybenko, and N Hanover. 2005. Detection of covert channel encoding in network packet delays. Rapport technique TR536, de lUniversité de Dartmouth 19 (2005).
[6]
Bruno Bouzy. 2017. Playing Hanabi Near-Optimally. In Advances in Computer Games. Springer, 51--62.
[7]
Steve Butler, Mohammad T Hajiaghayi, Robert D Kleinberg, and Tom Leighton. 2009. Hat guessing games. SIAM review 51, 2 (2009), 399--413.
[8]
Serdar Cabuk, Carla E Brodley, and Clay Shields. 2004. IP covert timing channels: design and detection. In Conference on Computer and Communications Security. ACM.
[9]
Serdar Cabuk, Carla E Brodley, and Clay Shields. 2009. IP covert channel detection. ACM Transactions on Information and System Security (TISSEC) 12, 4 (2009), 22.
[10]
Rodrigo Canaan, Haotian Shen, Ruben Torrado, Julian Togelius, Andy Nealen, and Stefan Menzel. 2018. Evolving Agents for the Hanabi 2018 CIG Competition. In 2018 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, 1--8.
[11]
Yanpei Chen, Vern Paxson, and Randy H Katz. 2010. What's new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5 January 20, 2010 (2010), 2010--5.
[12]
David Cock, Qian Ge, Toby Murray, and Gernot Heiser. 2014. The last mile: An empirical study of timing channels on seL4. In ACM Conference on Computer and Communications Security.
[13]
Christopher Cox, Jessica De Silva, Philip Deorsey, Franklin HJ Kenter, Troy Retter, and Josh Tobin. 2015. How to make the perfect fireworks display: Two strategies for Hanabi. Mathematics Magazine 88, 5 (2015), 323--336.
[14]
Markus Eger and Chris Martens. 2017. A Browser-based Interface for the Exploration and Evaluation of Hanabi AIs. Tech Demo at Foundations of Digital Games. (2017).
[15]
Markus Eger, Chris Martens, and Marcela Alfaro Córdoba. 2017. An Intentional AI for Hanabi. In Computational Intelligence and Games (CIG), 2017 IEEE Conference on. IEEE.
[16]
Julie Ferrigno and Martin Hlavác. 2008. When AES blinks: introducing optical side channel. IET Information Security 2, 3 (2008), 94--98.
[17]
Bryan Ford. 2012. Plugging side-channel leaks with timing information flow control. In Proceedings of the 4th USENIX conference on Hot Topics in Cloud Ccomputing.
[18]
Qian Ge, Yuval Yarom, David Cock, and Gernot Heiser. 2018. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. Journal of Cryptographic Engineering 8, 1 (2018), 1--27.
[19]
Annarita Giani, Vincent H Berk, and George V Cybenko. 2006. Data exfiltration and covert channels. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V, Vol. 6201. International Society for Optics and Photonics, 620103.
[20]
Mordechai Guri, Matan Monitz, Yisroel Mirski, and Yuval Elovici. 2015. Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations. In Computer Security Foundations Symposium (CSF). IEEE.
[21]
Mordechai Guri, Boris Zadov, Dima Bykhovsky, and Yuval Elovici. 2018. Power-Hammer: Exfiltrating Data from Air-Gapped Computers through Power Lines. arXiv.1804.04014 (2018).
[22]
Mordechai Guri, Boris Zadov, and Yuval Elovici. 2017. LED-it-GO:Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer.
[23]
Wei-Ming Hu. 1992. Reducing timing channels with fuzzy time. Journal of computer security (1992).
[24]
Michael Hutter and Jörn-Marc Schmidt. 2013. The temperature side channel and heating fault attacks. In International Conference on Smart Card Research and Advanced Applications. Springer.
[25]
Boris Köpf and Markus Dürmuth. 2009. A provably secure and efficient countermeasure against timing attacks. In 22nd IEEE Computer Security Foundations Symposium.
[26]
Yannis Labrou, Tim Finin, and Yun Peng. 1999. Agent communication languages: The current landscape. IEEE Intelligent systems 2 (1999), 45--52.
[27]
Butler W Lampson. 1973. A note on the confinement problem. Commun. ACM 16, 10 (1973), 613--615.
[28]
Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2008. Power analysis attacks: Revealing the secrets of smart cards. Vol. 31. Springer Science & Business Media.
[29]
Clémentine Maurice, Manuel Weber, Michael Schwarz, Lukas Giner, Daniel Gruss, Carlo Alberto Boano, Stefan Mangard, and Kay Römer. 2017. Hello from the other side: SSH over robust cache covert channels in the cloud. In Proceedings of the Network and Distributed System Security Symposium.
[30]
Jonathan Millen. 1999. 20 years of covert channel modeling and analysis. In Symposium on Security and Privacy. IEEE.
[31]
Steven J Murdoch and Stephen Lewis. 2005. Embedding covert channels into TCP/IP. In International Workshop on Information Hiding. Springer.
[32]
Hirotaka Osawa. 2015. Solving Hanabi: Estimating Hands by Opponent's Actions in Cooperative Game with Incomplete Information. In Workshops at the Twenty-Ninth AAAI Conference on Artificial Intelligence.
[33]
Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache attacks and countermeasures: the case of AES. In Cryptographers' Track at the RSA Conference. Springer.
[34]
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. 2009. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and Communications Security. ACM.
[35]
Eisuke Sato, Takuya Kato, and Hirotaka Osawa. 2018. Development and evaluation of the game agent to add opponent thinking time as indicator of strategy in Cooperative game Hanabi. Game Programming Workshop 2018 (2018), 30--34.
[36]
Michael Schwarz, Clémentine Maurice, Daniel Gruss, and Stefan Mangard. 2017. Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript. In Financial Cryptography and Data Security.
[37]
Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, and Stefan Mangard. 2017. Malware guard extension: Using SGX to conceal cache attacks. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer.
[38]
Spiel des Jahres. 2013. Spiel des Jahres Award 2013. http://www.spieldesjahres.de/en/hanabi
[39]
Mark JH van den Bergh, Anne Hommelberg, Walter A Kosters, and Flora M Spieksma. 2016. Aspects of the cooperative card game Hanabi. In Benelux Conference on Artificial Intelligence. Springer, 93--105.
[40]
Bhanu C Vattikonda, Sambit Das, and Hovav Shacham. 2011. Eliminating fine grained timers in Xen. In ACM Cloud Computing Security Workshop.
[41]
Paul Vines and Tadayoshi Kohno. 2015. Rook: Using video games as a low-bandwidth censorship resistant communication platform. In Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society. ACM, 75--84.
[42]
Joseph Walton-Rivers. 2018. Fireworks agent competition. http://hanabi.aiclash.com.
[43]
Joseph Walton-Rivers, Piers R Williams, Richard Bartle, Diego Perez-Liebana, and Simon M Lucas. 2017. Evaluating and modelling Hanabi-playing agents. In Evolutionary Computation (CEC), 2017 IEEE Congress on. IEEE, 1382--1389.
[44]
Wolfgang Warsch. 2018. The Mind. http://www.nsv.de/spielregeln/TheMind_GB.pdf.
[45]
John C Wray. 1992. An analysis of covert timing channels. Journal of Computer Security 1, 3-4 (1992), 219--232.
[46]
Weiyi Wu, Ennan Zhai, Daniel Jackowitz, David Isaac Wolinsky, Liang Gu, and Bryan Ford. 2015. Warding off timing attacks in Deterland. arXiv:1504.07070 (2015).
[47]
Zhenyu Wu, Zhang Xu, and Haining Wang. 2012. Whispers in the Hyperspace: High-speed Covert Channel Attacks in the Cloud. In USENIX Security Symposium.
[48]
Zhenyu Wu, Zhang Xu, and Haining Wang. 2014. Whispers in the Hyperspace: High-bandwidth and Reliable Covert Channel Attacks inside the Cloud. IEEE/ACM Transactions on Networking (2014).
[49]
Yuval Yarom and Katrina Falkner. 2014. Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In USENIX Security Symposium.
[50]
Sebastian Zander, Grenville Armitage, and Philip Branch. 2007. A survey of covert channels and countermeasures in computer network protocols. Communications Surveys & Tutorials 9, 3 (2007), 44--57.
[51]
Yinqian Zhang, Ari Juels, Alina Oprea, and Michael K. Reiter. 2011. Home-Alone: Co-residency Detection in the Cloud via Side-Channel Analysis. In IEEE Symposium on Security and Privacy.
[52]
Ziqiao Zhou, Michael K. Reiter, and Yinqian Zhang. 2016. A software approach to defeating side channels in last-level caches. In ACM Conference on Computer and Communications Security.

Cited By

View all
  • (2021) Operationalizing Intentionality to Play Hanabi With Human Players IEEE Transactions on Games10.1109/TG.2020.300935913:4(388-397)Online publication date: Dec-2021
  • (2021)Evaluating a Plan Recognition Agent for the Game Pandemic with Human Players2021 IEEE Conference on Games (CoG)10.1109/CoG52621.2021.9619040(1-7)Online publication date: 17-Aug-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
FDG '19: Proceedings of the 14th International Conference on the Foundations of Digital Games
August 2019
822 pages
ISBN:9781450372176
DOI:10.1145/3337722
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 August 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Hanabi
  2. agent design
  3. timing

Qualifiers

  • Research-article

Conference

FDG '19

Acceptance Rates

FDG '19 Paper Acceptance Rate 46 of 124 submissions, 37%;
Overall Acceptance Rate 152 of 415 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)1
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021) Operationalizing Intentionality to Play Hanabi With Human Players IEEE Transactions on Games10.1109/TG.2020.300935913:4(388-397)Online publication date: Dec-2021
  • (2021)Evaluating a Plan Recognition Agent for the Game Pandemic with Human Players2021 IEEE Conference on Games (CoG)10.1109/CoG52621.2021.9619040(1-7)Online publication date: 17-Aug-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media