A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd
Abstract
Privacy-preserving AI algorithms are widely adopted in various domains, but the lack of transparency might pose accountability issues. While auditing algorithms can address this issue, machine-based audit approaches are often costly and time-consuming. Herd audit, on the other hand, offers an alternative solution by harnessing collective intelligence. Nevertheless, the presence of epistemic disparity among auditors, resulting in varying levels of expertise and access to knowledge, may impact audit performance. An effective herd audit will establish a credible accountability threat for algorithm developers, incentivizing them to uphold their claims. In this study, our objective is to develop a systematic framework that examines the impact of herd audits on algorithm developers using the Stackelberg game approach. The optimal strategy for auditors emphasizes the importance of easy access to relevant information, as it increases the auditors’ confidence in the audit process. Similarly, the optimal choice for developers suggests that herd audit is viable when auditors face lower costs in acquiring knowledge. By enhancing transparency and accountability, herd audit contributes to the responsible development of privacy-preserving algorithms.
I Introduction
AI and algorithmic decision-making have become pervasive in both business and society. However, when algorithms are treated as “black boxes” and their inner workings remain undisclosed, it becomes difficult to ensure that they perform as intended and adhere to necessary standards [1]. One specific category of algorithms that exemplifies this challenge is privacy-preserving algorithms [2]. For instance, platforms like Facebook Ad Recommendation Systems, Google SQL, and Safari have integrated differential privacy into their products to provide privacy protection. Nevertheless, verifying such claims can be arduous and intricate, for example, see [3, 4, 5].
Herd Audit: Auditing algorithms [6], [7] play a crucial role in tackling this challenge. However, traditional machine-based audit methods like direct scraping, sock puppet, and carrier puppet often necessitate the development of custom computer programs to gather data. Not only can these approaches be expensive, but they also consume a significant amount of time. A cost-effective alternative approach to auditing involves leveraging citizen science and crowd-sourcing principles to establish a democratic audit process that engages a diverse population of end users [8]. This concept gives rise to herd-audit (or group-audit) approaches. By empowering end users as auditors, we can foster a more democratic approach to algorithmic auditing while minimizing costs and time investments.
Epistemic Disparity: One significant challenge in implementing herd-audit approaches is the presence of epistemic disparity [9, 10]. Not all users possess the same level of expertise or information required to conduct comprehensive audits of algorithms. A user-auditor with limited cognitive resources may inadvertently provide opportunities for algorithm developers to evade their responsibility. To some extent, incorporating audit into the algorithm design process itself establishes an accountability mechanism for developers. This accountability mechanism acts as an incentive for algorithm developers to uphold their claims and create responsible algorithms.
Game-Theoretic Framework: To design an effective herd-audit mechanism, this work aims to develop a comprehensive system framework that investigates the influence of herd-audit on algorithm developers. To accomplish the goal, the system framework adopts a Stackelberg game approach [11, 12]. In this approach, the developer assumes the role of the leader and determines the desired level of performance for differential privacy. The followers, comprising idiosyncratic end-users or auditors, are selected from a user population characterized by varying levels of epistemic capabilities. The proposed framework assumes that algorithms and their associated guarantees are clearly communicated to the end-users through a privacy protection agreement. This leader-and-follower structure allows us to analyze the optimal strategies employed by both the developer and the auditors, providing insights into the potential noncompliant behaviors of developers.
In order to capture the epistemic disparity experienced by end-users (auditors), this work employs a rational inattention model [13, 14], which takes into account the costs associated with accessing information during the decision-making process. We analyze the epistemic disparity among auditors, characterized by the epistemic factor, which measures the difficulty of accessing information. We find that auditors with lower epistemic factors exhibit higher audit confidence, indicating a better audit performance. Furthermore, our investigation reveals that a herd audit is a viable approach when auditors face lower costs in accessing information. In such circumstances, the algorithm developer is less likely to deviate significantly from their claims. Our findings highlight the importance of reducing epistemic injustice as well as lowering information costs to enhance the effectiveness of herd audits. By doing so, we can foster a more reliable and accountable environment for the development of algorithms.
Related Works Algorithm auditing refers to the process of evaluating the algorithms used in systems or applications to ensure they are fair, transparent, unbiased, and comply with ethical standards [6]. In differential privacy, several machine-based verification methods have been proposed [3, 4, 5]. While there has been a rich literature on citizen science and its applications in crowdsensing [15], crowdsourcing [16], and crowd defense [17], herd audit is a concept in its infancy. It reduces auditing costs and poses a threat to developers, as public perception [18] can be influenced by the audit results.
The disparity in the capability of herd behaviors has been studied in collective intelligence [19, 8, 20, 21]. The literature has examined the performance [22], reliability [23], and trustworthiness [24] of participants engaged in outsourced tasks. Processes such as risk and reputation management [25, 26] have been utilized to understand the differences among participants. Numerous studies have focused on different cognitive behaviors in humans, including cognitive-behavioral theory [27, 28, 29] which elucidates how thoughts, beliefs, and cognitive processes shape behavior, and the theory of mind [30] that attributes mental states such as beliefs and emotions to predict individuals’ behavior. In our work, we employ the concept of rational inattention, as studied in [31], which provides a framework that analyzes how decision-makers acquire information while considering associated costs, enabling investigations into cognitive impacts on audit decisions.
A game-theoretic approach is commonly employed to capture the threat posed by followers in dynamic games, such as ultimatum games [32], Stackelberg games [33], bargaining games [34], as well as contract [35, 36] and incentive mechanisms designs [37, 38]. Recently, there has been increased interest in the investigation of evasion behaviors [39]. This includes exploiting evasion-aware detection methods [40] and developing evaders for subsequent tests of collaborative cognition-assisted detector [41].
II Herd Auditors with Epistemic Disparity
In the context of herd-auditing an algorithm, the auditor is uncertain about the true state , where indicates the null hypothesis, implying that the algorithm is consistent with the claim, while is for the alternative hypothesis, meaning that the algorithm does not comply. The prior belief of state can be denoted as , implying the auditor’s uncertainty in the algorithm’s compliance.
In order to reduce the uncertainty, the auditor can obtain information about the state according to the information-obtaining strategy . More specifically, can be viewed as the outcome of the algorithm, and indicates how the auditor accesses (obtains) it. The information together with the obtaining strategy leads to a posterior belief of the state .
Based on the information (correspondingly, the posterior belief ), the auditor can select an element from a finite action set , where means reporting algorithm compliance, while indicates reporting non-compliance. The decision rule aims to maximize the expected utility of , where is the utility of choosing action when the state is .
However, the acquisition of information can incur costs, which can be viewed as the discrepancy between the prior belief and the posterior belief regarding the state . In conventional rational inattention research, a common method to model the cost is through the lens of Shannon mutual information. Furthermore, due to variations in epistemic disparities, the cost incurred for accessing information (i.e., reduction in uncertainty) differs among auditors. To account for this, we introduce the concept of an epistemic factor for each auditor, denoted as , which quantifies the differences in the cost experienced by different auditors when reducing the same amount of uncertainty. The larger value of implies harder access to relevant information, as the cost for the same amount of uncertainty reduction becomes higher. To this end, the auditor’s objective becomes
(1) |
where the expected utility is given by
(2) |
and the information cost is expressed as
(3) |
II-A Bayes hypothesis testing as the auditor’s decision rule
Conventionally, Bayes hypothesis testing deals with the optimization problem
(4) |
with given distributions for both hypotheses and during decision-making, which coincides with the first term in the auditor’s objective (1). According to detailed derivation in Appendix -A, the optimal decision rule can be written as
(5) |
which leads us to a threshold decision rule and can be viewed as making a decision based on the posteriors. We represent the optimal decision rule with given and as , and denote the information set partitioned by as
(6) |
II-B Auditor’s choice of the information strategy
With the optimal decision rule , the auditor’s objective:
(7) |
which leads to the constrained optimization problem
(8) | ||||
s.t. |
With detailed derivations in Appendix -B we arrive at:
(9) | |||
(10) |
The corresponding posterior belief can then be written as
(11) |
Note that the case can be viewed as the posterior belief given that results in an action (i.e., ), while the case can be viewed as the posterior belief given that results in an action (i.e., ). A similar expression can be found for .
(12) |
where and are corresponding normalization terms.
Remark 1.
For an auditor with epistemic factor , the information-obtaining strategy represented by the conditional probability is chosen if its resulting posterior belief maximizes the value of .
The , can also be interpreted as the audit confidence for making the decision when observing the information . Since , it is evident that auditors with a smaller epistemic factor have higher confidence in the audit process. This implies that auditors who can easily access relative information are more likely to perform better in the audit.
III Stackelberg Herd Audit Game
To examine the impact of herd audit on the developer’s incentive to behave irresponsibly, we formulate the interplay between the herd auditor (she) and the algorithm developer (he) as a Stackelberg herd audit game, depicted in Fig. 3.
III-A Connection to differential privacy
We begin with the definition of -differential privacy.
Definition 1 (-DP).
A (randomized) mechanism is -differentially private (-DP) if for every pair of neighboring inputs , and for every (measurable) output set , the probabilities of events and are closer than a factor of :
(13) |
In the context of differential privacy, consider a scenario in which there is a public-known privacy protection agreement that requires privacy budget. However, since more privacy budget (which means decreasing the privacy protection and making the results more distinguishable) often leads to better algorithm accuracy, the algorithm developer has the incentive to use some when performing the algorithm, which creates irresponsibility. Hence, we consider the state means and the state means . Since privacy protection is often achieved by adding noise, it is assumed that for an algorithm with input dataset , the privacy budget results in an output distribution for later usage.
III-B Problem Setting for the Developer
Consider two types of algorithm developers and , and they play a mixed strategy for executing , which are and , respectively (for discrete choices of ). Each results in an algorithm accuracy , where , under the assumption that a larger leads to better accuracy.
Assumption 1.
Given algorithm and input set , a privacy budget leads to a unique output distribution .
Assumption 2.
For a given algorithm, the algorithmic accuracy under the privacy budget is governed by , and it is increasing in .
In this context, the developer’s strategy given his type will lead to the distributions for the two hypotheses
(14) | ||||
(15) |
where is the distribution in Assumption 1.
III-B1 Responsible developer
For a responsible algorithm developer, the mixed strategy should have mass for , which means that he always provides privacy protection at least complies with the agreement. Moreover, in order to maximize , a responsible algorithm developer tends to put all the mass on since .
Proposition 1 (Responsible Developer’s Strategy).
A responsible developer’s mixed strategy reduces to a pure strategy by letting all the mass on . Hence, .
III-B2 Irresponsible developer
However, it is important to consider various scenarios involving an irresponsible algorithm developer who prioritizes algorithm performance and disregards compliance with the agreement. If there is no auditor or no penalty imposed when the developer fails to pass the audit (i.e., when the auditor determines that ), the irresponsible developer can choose an extremely large value for . Consequently, it is reasonable to assume that a penalty will be enforced if the irresponsible developer is detected. In such a situation, the irresponsible developer may attempt to maximize the probability of avoiding penalties, which is the probability of the auditor deciding .
Assumption 3.
The irresponsible algorithm developer’s mixed strategy will not put any mass on . That is, .
III-C Revisiting the Auditor’s Problem
Considering that the penalty term for the irresponsible developer is influenced by the actions of the auditor, in terms of whether the irresponsible developer is caught or not, it is necessary to reexamine the problem from the auditor’s perspective when the developer is also a strategic player aiming to evade the audit. We reformulate the auditor’s problem by letting and setting the penalty terms and to negative values. However, within the context of DP, it is important to note that the distributions for these hypotheses are predefined by the output distribution and the developer’s mixed strategy given the observed information . The audit confidences are analogous to those provided in (11) and (12).
Assumption 4.
Assume that and are the negative utilities for making wrong audit decisions.
Given the distributions for the two hypotheses and , the auditor aims to achieve the following:
(16) | ||||
where the first two terms put negative weights on the audit error, and the last term quantifies the expected reduction in uncertainty for the state , measured in terms of the Kullback–Leibler (KL) divergence:
The decision of , already incorporate the auditor’s information strategy since .
III-D Revisit the Irresponsible Developer’s Problem
Until now, the irresponsible developer’s objective has become the following.
(17) |
with comes from the auditor’s problem. The former term is the expected algorithm accuracy, and the latter term corresponds to the false negative rate of the auditor’s decision, which is the rate of the irresponsible developer successfully passing the audit (and thus, the irresponsible developer seeks to maximize it). Note that indicates the irresponsible developer’s preference for the two goals.
IV Equilibrium Analysis
For illustrative purposes, we work through an example where in Appendix -C. Besides, we assume that the distinguishability—quantified by distance measures such as the Kullback–Leibler divergence—between the output distributions and increases when the difference between and expands.
IV-A The auditor’s optimal strategy
With the example in Appendix -C and derivations in Appendix -D, the auditor’s and that optimally solves problem (16) can be written as:
(18) |
(19) |
and denotes the normalization term. We can observe that and share a similar form as (11) and (12).
Proposition 2.
Remark 2.
The results coincide with the intuition. We first take a look at . Recall that is negative. If the penalty term is the same across all the auditors, the auditor with a larger epistemic factor achieves that is closer to . Combining with the auditor’s objective in the maximization problem (16), it means that the larger- auditor might have a larger false negative error. Similarly, for , the larger- auditor might have a larger false positive error.
IV-B The irresponsible developer’s optimal strategy
The irresponsible developer’s problem (17) is organized into
(20) | ||||
The irresponsible developer determines his optimal pure strategy to maximize (20). Specifically, the irresponsible developer assigns to the that achieves the largest . This leads us to the following propositions and remarks.
Proposition 3.
The irresponsible developer’s optimal strategy is choosing the that maximizes .
Proposition 4.
If algorithm accuracy is increasing in , the irresponsible developer always chooses the largest if .
Proof.
We sketch the proof in Appendix -E. ∎
Remark 3.
The irresponsible developer violates as much as possible when the epistemic factor for the auditor .
Remark 4.
When the auditor’s epistemic factor is small, indicating easy access to relevant information, an irresponsible developer is more likely to violate the claim.
Remark 5.
If the auditor’s epistemic factor is large, it is likely that an irresponsible developer with a larger (placing more value on the success rate of passing audits) will also tend to violate the claim more severely.
IV-C Auditor’s audit confidence and epistemic factor
With respect to Fig. 4, the optimal solution to the auditor’s problem given by (18) and (19) establishes a relationship between the epistemic factor and the auditor’s confidence under fixed utilities . Let and . Taking the partial derivative of with respect to yields Here, if the developer is irresponsible, then he never chooses a privacy budget that is equal to the claimed budget . Hence, . The term is (strictly) positive if and (strictly) negative otherwise. When , is close to when goes close to . Furthermore, the audit confidences for and become close to when increases, which reveals that higher leads to a weaker incentive to acquire more accurate information, thereby inducing lower audit confidences.
Similarly, The term is positive if and negative otherwise. When , is close to when goes close to . Furthermore, the audit confidences for and become closer to when increases, which coincides with the setting that higher leads to a weaker incentive to acquire more accurate information, thereby inducing lower audit confidences.
Note that audit confidence is determined by optimizing the objective, which consists of penalties for audit errors and costs associated with information acquisition. In this context, it is important to carefully select reasonable intervals for and . In practice, as auditors are end-users for the algorithm, and given the disparities in end-users across different algorithms, the range for the epistemic factor needs to be contingent upon the ease with which corresponding end-users of the algorithm can access relevant information.
IV-D Irresponsible developer’s choice and auditor’s confidence
According to (14) and (15), the irresponsible developer’s budget choice determines given . Hence, (18) and (19) (shown in Fig. 5) also establish a relationship between the irresponsible developer’s choice and the auditor’s confidence.
By taking partial derivative of with respect to , we obtain which is negative since . Additionally, as the value of increases (when auditors incur higher costs for information acquisition), the magnitude of decreases, implying relatively less influence on audit confidence. This trend is evident in Figure 5, where a greater corresponds to a flatter curve for .
V Discussion and Conclusions
Herd audit is a collective mechanism that empowers users to hold algorithm developers accountable, fostering the development of compliant and responsible digital products for the betterment of society. In this study, we examine herd audit through a game-theoretic lens, capturing the interactions between an idiosyncratic user and a privacy-preserving algorithm developer. Our framework adopts a Stackelberg game approach, enabling us to assess the impact of herd audit on responsible algorithm design and understand selfish and irresponsible strategies in worst-case scenarios.
We have specifically explored the presence of auditors with varying cognitive and reasoning capabilities, capturing epistemic disparities. Within our game-theoretic framework, we have consolidated the concept of rational inattention. The optimal strategy for auditors underscores the importance of easy access to relevant information, which enhances their confidence in the herd-audit process. Similarly, the optimal decision for algorithm developers has revealed that herd audit is a viable approach when auditors face lower costs in accessing knowledge, as denoted by smaller epistemic factors. Based on our findings, we conclude that herd audit poses a credit threat to developers and plays a vital role in promoting the responsible development of privacy-preserving algorithms. In future work, we aim to enrich the game-theoretic framework by incorporating end-users’ incentives. This extension allows us to design an incentive mechanism that encourages participation in herd audits. Additionally, we plan to explore the fusion of distributed audits alongside a central audit center. Leveraging tools from decentralized hypothesis testing, game theory, information theory, and differential privacy, this research direction holds promise for advancing the field further.
References
- [1] J. Guszcza, I. Rahwan, W. Bible, M. Cebrian, and V. Katyal, “Why we need to audit algorithms,” 2018. [Online]. Available: https://hdl.handle.net/21.11116/0000-0003-1C9E-D
- [2] C. Dwork, “Differential privacy: A survey of results,” in Theory and Applications of Models of Computation: 5th International Conference, TAMC 2008, Xi’an, China, April 25-29, 2008. Proceedings 5. Springer, 2008, pp. 1–19.
- [3] Z. Ding, Y. Wang, G. Wang, D. Zhang, and D. Kifer, “Detecting violations of differential privacy,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, pp. 475–489.
- [4] B. Bichsel, T. Gehr, D. Drachsler-Cohen, P. Tsankov, and M. Vechev, “Dp-finder: Finding differential privacy violations by sampling and optimization,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ’18. New York, NY, USA: Association for Computing Machinery, 2018, p. 508–524.
- [5] Y. Han and S. Martínez, “A numerical verification framework for differential privacy in estimation,” IEEE Control Systems Letters, vol. 6, pp. 1712–1717, 2021.
- [6] J. Bandy, “Problematic machine behavior: A systematic literature review of algorithm audits,” Proceedings of the acm on human-computer interaction, vol. 5, no. CSCW1, pp. 1–34, 2021.
- [7] B. Mittelstadt, “Automation, algorithms, and politics— auditing for transparency in content personalization systems,” International Journal of Communication, vol. 10, p. 12, 2016.
- [8] J. M. Leimeister, “Collective intelligence,” Business & Information Systems Engineering, vol. 2, pp. 245–248, 2010.
- [9] M. Fricker, Epistemic injustice: Power and the ethics of knowing. Oxford University Press, 2007.
- [10] H. Grasswick, “Epistemic injustice in science,” in The Routledge handbook of epistemic injustice. Routledge, 2017, pp. 313–323.
- [11] M. H. Manshaei, Q. Zhu, T. Alpcan, T. Bacşar, and J.-P. Hubaux, “Game theory meets network security and privacy,” ACM Computing Surveys (CSUR), vol. 45, no. 3, pp. 1–39, 2013.
- [12] F. Fang, S. Liu, A. Basak, Q. Zhu, C. D. Kiekintveld, and C. A. Kamhoua, “Introduction to game theory,” Game Theory and Machine Learning for Cyber Security, pp. 21–46, 2021.
- [13] F. Matějka and A. McKay, “Rational inattention to discrete choices: A new foundation for the multinomial logit model,” American Economic Review, vol. 105, no. 1, pp. 272–298, 2015.
- [14] A. Caplin and M. Dean, “Revealed preference, rational inattention, and costly information acquisition,” American Economic Review, vol. 105, no. 7, pp. 2183–2203, July 2015.
- [15] F. Restuccia, N. Ghosh, S. Bhattacharjee, S. K. Das, and T. Melodia, “Quality of information in mobile crowdsensing: Survey and research challenges,” ACM Transactions on Sensor Networks (TOSN), vol. 13, no. 4, pp. 1–43, 2017.
- [16] Y. Zhao and Q. Zhu, “Evaluation on crowdsourcing research: Current status and future direction,” Information systems frontiers, vol. 16, pp. 417–434, 2014.
- [17] J. Pawlick and Q. Zhu, “Active crowd defense,” Game Theory for Cyber Deception: From Theory to Applications, pp. 147–167, 2021.
- [18] H. Frye, “The technology of public shaming,” Social Philosophy and Policy, vol. 38, no. 2, pp. 128–145, 2021.
- [19] H. Yu, C. Miao, C. Leung, Y. Chen, S. Fauvel, V. R. Lesser, and Q. Yang, “Mitigating herding in hierarchical crowdsourcing networks,” Scientific reports, vol. 6, no. 1, p. 4, 2016.
- [20] I. Comeig, E. Mesa-Vázquez, P. Sendra-Pons, and A. Urbano, “Rational herding in reward-based crowdfunding: An mturk experiment,” Sustainability, vol. 12, no. 23, p. 9827, 2020.
- [21] C. Eickhoff, “Cognitive biases in crowdsourcing,” in Proceedings of the eleventh ACM international conference on web search and data mining, 2018, pp. 162–170.
- [22] R. R. Morris, M. Dontcheva, and E. M. Gerber, “Priming for better performance in microtask crowdsourcing environments,” IEEE Internet Computing, vol. 16, no. 5, pp. 13–19, 2012.
- [23] D. R. Karger, S. Oh, and D. Shah, “Budget-optimal task allocation for reliable crowdsourcing systems,” Operations Research, vol. 62, no. 1, pp. 1–24, 2014.
- [24] K. Wang, X. Qi, L. Shu, D.-j. Deng, and J. J. Rodrigues, “Toward trustworthy crowdsourcing in the social internet of things,” IEEE Wireless Communications, vol. 23, no. 5, pp. 30–36, 2016.
- [25] M. Allahbakhsh, A. Ignjatovic, B. Benatallah, E. Bertino, N. Foo et al., “Reputation management in crowdsourcing systems,” in 8th International conference on collaborative computing: networking, applications and worksharing (CollaborateCom). IEEE, 2012, pp. 664–671.
- [26] Y. Yu, S. Liu, L. Guo, P. L. Yeoh, B. Vucetic, and Y. Li, “Crowdr-fbc: A distributed fog-blockchains for mobile crowdsourcing reputation management,” IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8722–8735, 2020.
- [27] A. A. González-Prendes and S. M. Resko, “Cognitive-behavioral theory,” 2012.
- [28] D. Fum, F. Del Missier, A. Stocco et al., “The cognitive modeling of human behavior: Why a model is (sometimes) better than 10,000 words,” Cognitive Systems Research, vol. 8, no. 3, pp. 135–142, 2007.
- [29] L. Huang and Q. Zhu, Cognitive Security: A System-Scientific Approach. Springer Nature, 2023.
- [30] J. R. Anderson, D. Bothell, M. D. Byrne, S. Douglass, C. Lebiere, and Y. Qin, “An integrated theory of the mind.” Psychological review, vol. 111, no. 4, p. 1036, 2004.
- [31] C. A. Sims, “Implications of rational inattention,” Journal of monetary Economics, vol. 50, no. 3, pp. 665–690, 2003.
- [32] S. Rajtmajer, A. Squicciarini, J. M. Such, J. Semonsen, and A. Belmonte, “An ultimatum game model for the evolution of privacy in jointly managed content,” in Decision and Game Theory for Security: 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings. Springer, 2017, pp. 112–130.
- [33] C. Casorrán, B. Fortz, M. Labbé, and F. Ordóñez, “A study of general and security stackelberg game formulations,” European journal of operational research, vol. 278, no. 3, pp. 855–868, 2019.
- [34] D. Guerrero, A. A. Carsteanu, and J. B. Clempner, “Solving stackelberg security markov games employing the bargaining nash approach: Convergence analysis,” Computers & Security, vol. 74, pp. 240–257, 2018.
- [35] J. Chen and Q. Zhu, “Optimal contract design under asymmetric information for cloud-enabled internet of controlled things,” in Decision and Game Theory for Security: 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings. Springer, 2016, pp. 329–348.
- [36] R. Zhang and Q. Zhu, “Flipin: A game-theoretic cyber insurance framework for incentive-compatible cyber risk management of internet of things,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2026–2041, 2019.
- [37] Q. Zhu, C. Fung, R. Boutaba, and T. Basar, “Guidex: A game-theoretic incentive-based mechanism for intrusion detection networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 11, pp. 2220–2230, 2012.
- [38] L. Huang and Q. Zhu, “Duplicity games for deception design with an application to insider threat mitigation,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4843–4856, 2021.
- [39] K. Horák, Q. Zhu, and B. Bošanskỳ, “Manipulating adversary’s belief: A dynamic game approach to deception by design for proactive network security,” in Decision and Game Theory for Security: 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings. Springer, 2017, pp. 273–294.
- [40] Y. Hu and Q. Zhu, “Evasion-aware neyman-pearson detectors: A game-theoretic approach,” in 2022 IEEE 61st Conference on Decision and Control (CDC), 2022, pp. 6111–6117.
- [41] S. N. Narayanan, A. Ganesan, K. Joshi, T. Oates, A. Joshi, and T. Finin, “Early detection of cybersecurity threats using collaborative cognition,” in 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), 2018, pp. 354–363.
-A Proof of optimal decision rule
For the null hypothesis, , and the alternative hypothesis, , the expected utility for problem in (LABEL:eq:4) can be reformulated as
Therefore, to maximize the expected utility, the auditor must decide if . This completes the proof.
-B Proof of optimal information strategy
To analyze the problem, we use the method of Lagrange multipliers and denote
with the last term corresponding to the constraint that should be a conditional probability mass function.
-C An illustrative example for equilibrium analysis
We consider a scenario where the cardinality of the set is three; i.e., with , where and it’s assumed that the claimed differential privacy budget is . Then, the two hypotheses become
According to derivations in Appendix -D, the strategy specified by (18) and (19) is optimal for the auditor with epistemic factor .
We then shift our focus to the irresponsible developer’s strategy. The irresponsible developer endeavors to enhance algorithmic accuracy while concurrently maximizing the probability of evading detection by the auditor, thereby increasing the likelihood of being perceived as a responsible developer. Hence, the irresponsible developer’s decision-making can be described by the following optimization problem:
(21) | ||||
By leveraging , we rewrite the problem (21) as follows:
(22) | ||||
Since the first two terms are independent of , (22) suggests the following strategy for the irresponsible developer: let ,
That is, the irresponsible developer has a pure strategy by choosing either or .
-D Proof of auditor’s strategy
In (16), the KL divergence term with a negative sign is concave with respect to the decision variables given fixed priors . Therefore, the combination of the terms in the objective function forms a weighted sum of concave functions. This makes the overall objective function concave. Given the linear constraints, the feasibility set is convex. Hence, the optimization problem (16) is a concave maximization over a convex set.
-E Proof of Proposition 4
We sketch the proof for with . In this example, and , then if .
Hence, in the case where , which leads to and . This completes the proof.