Filters








2,916 Hits in 2.5 sec

Through Modeling to Synthesis of Security Automata

Fabio Martinell, Ilaria Matteucci
2007 Electronical Notes in Theoretical Computer Science  
We define a set of process algebra operators, that we call controller operators, able to mimic the behavior of security automata introduced by Schneider in [17] and by Ligatti and al. in [3].  ...  Security automata are mechanisms for enforcing security policies that specify acceptable executions of programs.  ...  Acknowledgement We thank the anonymous referees of STM06 for valuable comments that helped us to improve this paper.  ... 
doi:10.1016/j.entcs.2006.08.029 fatcat:ufqcd5vqsbgynmzly6fqgypomy

You Should Better Enforce Than Verify [chapter]

Yliès Falcone
2010 Lecture Notes in Computer Science  
We then present previous theoretical models of runtime enforcement mechanisms and their expressive power with respect to enforcement.  ...  of systems and to guarantee desired behaviors.  ...  Pinchinat for their comments on an early version of this tutorial.  ... 
doi:10.1007/978-3-642-16612-9_9 fatcat:644w52hvwjdargcsoclapzpgvy

Advances and challenges of quantitative verification and synthesis for cyber-physical systems

Marta Kwiatkowska
2016 2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)  
This paper gives an overview of quantitative verification and synthesis techniques developed for cyber-physical systems, summarising recent achievements and future challenges in this important field.  ...  Since they are increasingly often used in safety-or business-critical contexts, to mention invasive treatment or biometric authentication, there is an urgent need for modelling and verification technologies  ...  Applications of probabilistic model checking using PRISM have spanned multiple fields, from wireless protocols and security analysis, through debugging DNA computing designs, to smart energy grids and  ... 
doi:10.1109/soscyps.2016.7579999 dblp:conf/cpsweek/Kwiatkowska16 fatcat:ugbkizf4xrcgzjvgtutecnepuu

Gate automata-driven run-time enforcement

Gabriele Costa, Ilaria Matteucci
2012 Computers and Mathematics with Applications  
The goal of this paper is to present gate automata and to show a gate automata-driven strategy for the run-time enforcement in the S × C × T.  ...  Gate automata have been proposed as a formalism for the specification of both security and trust policies in the scope of the Security-by-Contract-with-Trust (S×C×T) framework.  ...  In [12] the authors present a method for modelling security automata through process algebra operators.  ... 
doi:10.1016/j.camwa.2011.08.046 fatcat:ejrjxd6jdjfgxbts46pnldnjka

Parametric Timed Model Checking for Guaranteeing Timed Opacity [chapter]

Étienne André, Jun Sun
2019 Lecture Notes in Computer Science  
We solve this problem in the setting of timed automata (TAs).  ...  We first provide a general solution, and then extend the problem to parametric TAs, by synthesizing internal timings making the TA secure.  ...  We thank Sudipta Chattopadhyay for helpful suggestions, Jiaying Li for his help with preliminary model conversion, and a reviewer for suggesting Remark 1.  ... 
doi:10.1007/978-3-030-31784-3_7 fatcat:v25khacdczavhpoqw47xwgtv7q

Trust-Driven Policy Enforcement through Gate Automata

Gabriele Costa, Ilaria Matteucci
2011 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing  
In this paper we introduce the notion of gate automata for describing security policies. This new kind of automata aim at defining a model for the specification of both security and trust policies.  ...  The main novelty of our proposal is a unified framework for the integration of security enforcement and trust monitoring.  ...  In [14] the authors present how security automata can be modelled through process algebra operators.  ... 
doi:10.1109/imis.2011.88 dblp:conf/imis/CostaM11 fatcat:s6nmo7o4dbblroaqta5uf6ssji

A framework for automatic generation of security controller

Fabio Martinelli, Ilaria Matteucci
2010 Software testing, verification & reliability  
Moreover, we describe a tool for the synthesis of secure systems which is able to generate appropriate controller programs.  ...  This paper concerns the study, the development and the synthesis of mechanisms for guaranteeing the security of complex systems, i.e., systems composed by several interacting components.  ...  The information obtained through partial model checking can be used to enforce a security property. It is worth noting that the process Y = a.Y is a model of D.  ... 
doi:10.1002/stvr.441 fatcat:74glxk6ybrhozgh65digxhstvy

Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm

Debasis Das, Rajiv Misra
2011 International journal of network security and its applications  
CA consists of two components 1) a set of cells and 2) a set of rules . Programmable Cellular Automata(PCA) employs some control signals on a Cellular Automata(CA) structure.  ...  Programmable Cellular Automata were successfully applied for simulation of biological systems, physical systems and recently to design parallel and distributed algorithms for solving task density and synchronization  ...  The desired CA model, evolved through an efficient implementation of genetic algorithm, is found to be at the edge of chaos.  ... 
doi:10.5121/ijnsa.2011.3615 fatcat:jjgcruvpqbafzfml4jiuhvdleq

A tool for domain-independent model mutation

Pablo Gómez-Abajo, Esther Guerra, Juan de Lara, Mercedes G. Merayo
2018 Science of Computer Programming  
To improve this situation, we propose Wodel: a domain-specific language and tool for model-based mutation that is independent of the domain metamodel.  ...  As an example, we illustrate the usage of Wodel for the mutation of security policies, and present an empirical evaluation of its expressiveness.  ...  Acknowledgements Work partially funded by project FLEXOR (Spanish MINECO, TIN2014-52129-R), project DArDOS (Spanish MINECO/FEDER TIN2015-65845-C3-1-R) and the R&D programme of the Madrid Region (S2013/  ... 
doi:10.1016/j.scico.2018.01.008 fatcat:mlrknmsdkbbjrijwdrid25774m

Embedded and Real-time Systems [chapter]

Edward L. Lamie
2009 Real-Time Embedded Multithreading Using ThreadX  
Verification models and techniques applied to testing and control of reactive systems RESEARCH CENTER Rennes -Bretagne-Atlantique THEME Embedded and Real Time Systems Project-Team VERTECS  ...  Model-checking timed automata The model of timed automata, introduced by Alur and Dill in the 90's [22] is commonly used to represent real-time systems.  ...  Introduction The VerTeCs team is focused on the use of formal methods to assess the reliability, safety and security of reactive software systems.  ... 
doi:10.1016/b978-1-85617-601-9.00001-2 fatcat:oo46lkp3gnbhbjc463pu7fs2hi

Embedded and Real-time Systems [chapter]

Edward L. Lamie
2009 Real-Time Embedded Multithreading Using ThreadX and MIPS  
Verification models and techniques applied to testing and control of reactive systems RESEARCH CENTER Rennes -Bretagne-Atlantique THEME Embedded and Real Time Systems Project-Team VERTECS  ...  Model-checking timed automata The model of timed automata, introduced by Alur and Dill in the 90's [22] is commonly used to represent real-time systems.  ...  Introduction The VerTeCs team is focused on the use of formal methods to assess the reliability, safety and security of reactive software systems.  ... 
doi:10.1016/b978-1-85617-631-6.00001-9 fatcat:sq7s43icwvgk7lro4lpmj46g4a

Active Automata Learning in Practice [chapter]

Falk Howar, Bernhard Steffen
2018 Lecture Notes in Computer Science  
We predicted four major topics to be addressed in the then near future: efficiency, expressivity of models, bridging the semantic gap between formal languages and analyzed components, and solutions to  ...  In this paper we review the progress that has been made over the past five years, assess the status of active automata learning techniques with respect to applications in the field of software engineering  ...  Especially, in the past six years (2011 to 2016) active automata learning has found many applications, ranging from security analysis, to testing, to verification, and even synthesis.  ... 
doi:10.1007/978-3-319-96562-8_5 fatcat:jtpzftrzvzf3tdtbncntfc4s4q

Hierarchical Coordinated Control for Power System Voltage Using Linear Temporal Logic

Hongshan ZHAO, Hongliang GAO, Yang XIA
2009 Engineering  
In order to implement system voltage coordinated control, the LTL specification formula was transformed into hybrid Automata model by the proposed algorithms.  ...  First, the hybrid Automata model for power system voltage control was given, and a hierarchical coordinated voltage control framework was described in detail.  ...  The control behavior is similar to the OLTC controller, its automata model is as shown in The Automata Model of Load Shedding Controller Load shedding is the final measure used to avoid a wide area  ... 
doi:10.4236/eng.2009.12014 fatcat:oakht6j6ffawpj2ps57rail5ji

Computational and Technological Models of Cognitive Monitoring Systems

Alexander Vodyaho, Evgeniy Postnikov, Osipov Vasiliy, Nataly Zhukova, Michael Chervontsev, Nikolai Klimov
2019 Advances in Science, Technology and Engineering Systems  
In the synthesis of models, it is proposed to reduce them to relatively finite operational automata. An example of a synthesized model of cognitive monitoring is given.  ...  Based on the analysis of known solutions, the problem of automatic synthesis of computational models of cognitive monitoring is posed.  ...  and problems with synthesis 4 Automata models Enough good speed of operation.  ... 
doi:10.25046/aj040226 fatcat:e2xnxk7ldbdkjcizwngugp3kke

Incremental Adaptive Attack Synthesis [article]

Seemanta Saha, William Eiers, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan
2019 arXiv   pre-print
We use symbolic execution to extract path constraints, automata-based model counting to estimate probabilities of execution paths, and meta-heuristics to maximize information gain based on entropy in order  ...  Our approach is incremental, reusing results from prior iterations in each attack step to improve the efficiency of attack synthesis.  ...  Then, we discuss the use of automata-based model counting for computing the objective function.  ... 
arXiv:1905.05322v1 fatcat:ptjsehwawbbdpmuis2oluiat64
« Previous Showing results 1 — 15 out of 2,916 results