Quantcast

Archive: Oct 2014

I am a legend 5: Predicting the opponent deck

Elie Bursztein now turns it over to his wife Celine to talk about their in-game web application which can help foresee the opponent’s deck in Hearthstone. So, let’s switch gears a little bit. We are going to tell you about how you can predict your opponent’s deck, and I’m going to let Celine tell...

I am a legend 4: Pricing cards with unique effects

Delving further into game analysis, Elie Bursztein provides some results of modeling cards with special effects to see if they are overpriced or undervalued. So, how do you take it to the next level? Well, it’s really difficult, at least without extra data. And this extra data is how people play the game....

I am a legend 3: Looking for undervalued cards in Hearthstone

What Elie Bursztein now looks into is the process of modeling cards by attributes to determine their real values and then compare those to the face values. Okay, so how do we scale that to hundreds of cards? More precisely, we were able to do 130 cards for this research, because modeling each attribute is a...

I am a legend 2: Card attributes and basic game assumptions

Elie Bursztein now looks into the attributes for each card in Hearthstone, providing a few simple examples of value discrepancy for some of the common ones. What makes this game so interesting is the cards. Everything is a card, and you should look at how the game is structured. Actually, your hero is a...

I am a legend: Hacking Hearthstone with machine learning

At Defcon 22, Elie Bursztein and his wife Celine present their research about finding undervalued cards in Hearthstone and predicting the opponent’s actions. Hi everyone! My name is Elie. Today Celine and I are going to talk to you about Blizzard’s new game Hearthstone. Just a quick disclaimer before we...

Weaponizing Your Pets 8: The Conclusions

The closing part of Mr. Bransfield’s presentation highlights the key takeaways from his research and some extracurricular activities for the Defcon community. So, what have we learned overall? A tech hobbyist with no prior firmware experience can create a functional War Kitteh Collar in a relatively short...

Weaponizing Your Pets 7: The Denial of Service Dog in Action

Gene Bransfield moves on to describe further experiments with weaponizing pets, now covering the deployment of the Denial of Service Dog project. Now I’ll move on to the Denial of Service Dog. So, the Denial of Service Dog, admittedly, is just trolling. There’s nothing socially redeeming about it...

Weaponizing Your Pets 6: The War Kitteh Success

The cat collar assembly being finally completed, the War Kitteh goes for a walkabout to do some wardriving in the neighborhood while staying tracked via GPS. So, now we’re back to our volunteer cat (see right-hand image). This bastard still owes me a cell phone. We’re going to send him out with some...

Weaponizing Your Pets 5: The Final Collar Assembly

This part of Gene Bransfield’s talk covers the final troubleshooting and gear preparation before the volunteer pets are good to go with the collar. So, when I was working with the Arduino stuff I had the TinyGPS++ stuff that I’d really liked to use. I loved to use TinyGPS++ because it was very easy to...