Game 3 – Malicious Employer

In this game, the employer’s App leverages its execution privilege to try to leak Points Of Interest of the user. Two versions of a malicious Data Task are available and they leak data differently. The goal here is to run both versions and explain the malicious data tasks logic and their differences. In particular, what is the precise leaking strategy that each Data Task implement ? If you want to submit your explanation, please use the form at the bottom of the page.

PDMS version

  • The Core enforces stateless data tasks: NO
  • The Core enforces deterministic data tasks: NO
  • The result size is limited to: 6 bits

Note that:

  • A POI is encoded on two 24 bits numbers
  • POIs are highly sensitives since they can reveal the PDMS owner habits, religion or sexual preferences.


      Run: 00        Nb of retrieved POIs: 00

                  First POI retrieved at run:

      Run: 00        Nb of retrieved POIs: 00

                  First POI retrieved at run:


Please answer the following questions and leave a contact e-mail to receive our response

Game3_Form
How many runs at minimum will be necessary to disclose 16 POI, with a result size of only 11 bits, considering stateless and non deterministic Data Tasks ?*

Comments are closed.