Introduction Models of Attack Trees Computational Semantics. Attack Trees. Models and Computation. Jan Willemson, Aivo Jürgenson, Margus Niitsoo
|
|
- Amberly Horn
- 5 years ago
- Views:
Transcription
1 Attack Trees Models and Computation Jan Willemson, Aivo Jürgenson, Margus Niitsoo Cybernetica, Estonia January 19th, 2010 University of Luxembourg
2 We will use the basic multi-parameter attack tree model introduced in Introduction Models of Attack Trees Computational Semantics subsequent analysis. An example attack tree originally given by Weiss [4] and adopted from [6] is presented in Figure 1. An Attack Tree Figure 1. Example of an attack tree Obtain Administrator Privileges OR Access System Console Obtain Administrator Password OR OR Enter Computer Center Corrupt Operator Guess Password Look Over Sys.Admin Shoulder Trojan Horse SA Account Corrupt Sys.Admin OR Break Into Computing Center Unattended Guest AND Obtain Password File Encounter Guessable Password
3 An Attack RDAG
4 Brief History Hierarchical approach to security evaluation: Fault trees (Vesely, Goldberg, Roberts, Haasl, 1981) Threat logic trees (Weiss, 1991) Attack trees (Schneier, 1999) Foundations of Attack Trees (Mauw & Oostdijk, 2005) Multi-parameter attack trees (Buldas et al., 2006)
5 Our Papers Buldas, Laud, Priisalu, Saarepera, Willemson, Rational Choice of Security Measures via Multi-Parameter Attack Trees, CRITIS 2006 Jürgenson, Willemson, Processing Multi-parameter Attacktrees with Estimated Parameter Values, IWSEC 2007 Jürgenson, Willemson, Computing Exact Outcomes of Multi-parameter Attack Trees, OTM 2008, IS 2008 Jürgenson, Willemson, Serial Model for Attack Tree Computations, ICISC 2009 Jürgenson, Willemson, On Fast and Approximate Attack Tree Computations, submitted to ISPEC 2010 Niitsoo, Finding the Optimal Behavior for Adaptive Attack trees, submitted to???
6 From Qualitative to Quantitative Analysis Once an attack tree is complete, one can use it for qualitative description of attack scenarios An Attack Tree for the Border Gateway Protocol, IETF draft, 2004
7 From Qualitative to Quantitative Analysis Once an attack tree is complete, one can use it for qualitative description of attack scenarios An Attack Tree for the Border Gateway Protocol, IETF draft, analyze some property of the attacks (cost, feasibility, skill level required, etc.) Schneier, 1999 Mauw&Oostdijk, 2005
8 From Qualitative to Quantitative Analysis Once an attack tree is complete, one can use it for qualitative description of attack scenarios An Attack Tree for the Border Gateway Protocol, IETF draft, analyze some property of the attacks (cost, feasibility, skill level required, etc.) Schneier, 1999 Mauw&Oostdijk, try to find the attack most profitable for the attacker Buldas et al., 2006
9 Rational Attacker Paradigm In order to find the best attack, we must assume some kind of rationality of the attacker The original model of Buldas et al. assumes that the attacker is a fully rational utility maximizer
10 Rational Attacker Paradigm In order to find the best attack, we must assume some kind of rationality of the attacker The original model of Buldas et al. assumes that the attacker is a fully rational utility maximizer Jürgenson&Willemson, 2009, builds on another framework: The attacker tries to first, maximize success probability second, achieve the best possible outcome Hence, a certain form of irrational behavior is obtained This is the first known treatment of irrational attacks using quantitative methods
11 Rational Attacker Paradigm In order to find the best attack, we must assume some kind of rationality of the attacker The original model of Buldas et al. assumes that the attacker is a fully rational utility maximizer Jürgenson&Willemson, 2009, builds on another framework: The attacker tries to first, maximize success probability second, achieve the best possible outcome Hence, a certain form of irrational behavior is obtained This is the first known treatment of irrational attacks using quantitative methods Niitsoo, 2010, has shown how to apply classical decision theory to attack tree computations
12 Parallel vs. Serial Approach Virtually all the present models of attack trees disregard the possible order of elementary attacks Schneier, 1999 Mauw&Oostdijk, 2005 Buldas et al., 2006 This restriction is unrealistic The attacker can use the knowledge concerning success/failure of some elementary attacks to decide, which attacks to skip or try next Intuitively, this will allow the attacker to avoid hopeless branches, thus reducing the potential penalties and increasing the expected outcome
13 Flavors of the Serial Model Blocking vs. non-blocking In practice, there exist elementary attacks, failed attempt of which blocks the execution of the whole tree, e.g. due to imprisonment of the attacker
14 Flavors of the Serial Model Blocking vs. non-blocking In practice, there exist elementary attacks, failed attempt of which blocks the execution of the whole tree, e.g. due to imprisonment of the attacker Fully adaptive vs. semi-adaptive In reality, the attacker can freely choose the order of the next elementary attacks based on the results of already tried ones From theoretical viewpoint, this gives a superexponential explosion Hence, for an intermediate step we may limit ourselves to the model, where the attacker Fixes the order of the elementary attacks in advance Is only allowed to skip some of them or stop attacking altogether
15 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalty paid yes q Attacker caught? Attacker caught? yes q + Penalty paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +
16 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalty paid yes q Attacker caught? Attacker caught? yes q + Penalty paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +
17 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalty paid yes q Attacker caught? Attacker caught? yes q + Penalty paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +
18 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalty paid yes q Attacker caught? Attacker caught? yes q + Penalty paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +
19 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalties paid yes q Attacker caught? Attacker caught? yes q + Penalties + paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +
20 The Attack Game (Buldas et al., 2006) Attack preparation costs Preventive security broken? yes p Gains from the attack (1 p) no Penalties paid yes q Attacker caught? Attacker caught? yes q + Penalties + paid (1 q ) no (1 q + ) no Cost Penalties Cost Cost+Gains Cost + Gains Penalties +
21 Multi-parameter Attack Trees (Buldas et al., 2006) Gains value gained from the successful attack Cost i cost of the elementary attack, p i success probability π i = q Penalty expected penalty, unsuccessful attack π + i = q + Penalty + expected penalty, successful attack Outcome i = p i Gains Cost i p i π + i (1 p i ) π i
22 Multi-parameter Attack Trees (Buldas et al., 2006) Gains value gained from the successful attack Cost i cost of the elementary attack, p i success probability π i = q Penalty expected penalty, unsuccessful attack π + i = q + Penalty + expected penalty, successful attack Outcome i = p i Gains Cost i p i π + i For an OR-node: (1 p i ) π i { (Cost, p, π +, π (Cost1, p ) = 1, π 1 +, π 1 ), if Outcome 1 > Outcome 2 (Cost 2, p 2, π 2 +, π 2 ), if Outcome 1 Outcome 2
23 Multi-parameter Attack Trees (Buldas et al., 2006) Gains value gained from the successful attack Cost i cost of the elementary attack, p i success probability π i = q Penalty expected penalty, unsuccessful attack π + i = q + Penalty + expected penalty, successful attack Outcome i = p i Gains Cost i p i π + i For an OR-node: (1 p i ) π i { (Cost, p, π +, π (Cost1, p ) = 1, π 1 +, π 1 ), if Outcome 1 > Outcome 2 (Cost 2, p 2, π 2 +, π 2 ), if Outcome 1 Outcome 2 For an AND-node: Cost = Cost 1 + Cost 2, p = p 1 p 2, π + = π π+ 2, π = p 1(1 p 2 )(π π 2 ) + (1 p 1)p 2 (π 1 + π+ 2 ) 1 p 1 p (1 p 1)(1 p 2 )(π 1 + π 2 ) 1 p 1 p 2
24 Buldas et al., 2006: pros and cons Pros: The semantics uses several intuitively relevant parameters The semantics is very fast, works by one tree traversal in time O(n)
25 Buldas et al., 2006: pros and cons Pros: The semantics uses several intuitively relevant parameters The semantics is very fast, works by one tree traversal in time O(n) Cons: In each OR-node, Outcome needs to be computed, which needs Gains for each OR-node, but Gains only has a meaning globally The model (as most of the other previous models) assumes that exactly one descendant is picked in an OR-node The model is inconsistent with Mauw&Oostdijk 2005
26 Jürgenson & Willemson, 2008 F Boolean formula corresponding to the attack tree X set of elementary attacks σ attack suite, satisfying the root node of the attack tree
27 Jürgenson & Willemson, 2008 F Boolean formula corresponding to the attack tree X set of elementary attacks σ attack suite, satisfying the root node of the attack tree max {Outcome σ : σ X, F(σ := true) = true} σ Outcome σ = p σ Gains X i σ Expenses i Expenses i = Cost i + p i π + i + (1 p i ) π i p σ = ρ σ F(ρ:=true)=true p i X i ρ X j σ\ρ (1 p j )
28 Implementation & Results Implemented in Perl programming language, using terribly inefficient data structures p σ can be computed in linear time Going through potentially all the subsets of X still remains exponential, of course Using a modified DPLL algorithm for finding all such attack suites, which satisfy the attack tree Theorem: We don t need to consider AND nodes, where some child node is not satisfied
29 Implementation & Results Implemented in Perl programming language, using terribly inefficient data structures p σ can be computed in linear time Going through potentially all the subsets of X still remains exponential, of course Using a modified DPLL algorithm for finding all such attack suites, which satisfy the attack tree Theorem: We don t need to consider AND nodes, where some child node is not satisfied Outcome JW08 Outcome B+06 If T 1 T 2 then Outcome(T 1 ) = Outcome(T 2 )
30 Average running time in seconds, logarithmic scale Figure 2. Performance test results Number of leaves in a tree
31 Figure Comparison 3. Precision of the computational with Buldas routineet of Buldas al., et 2006 al. [10] Number of trees Found the same attack suite Number of trees Number of leaves in a tree
32 Jürgenson & Willemson, 2010 Reimplementation of Jürgenson & Willemson, 2008 C++ instead of Perl Removing unnecessary DPLL overhead (e.g. transformation to CNF) Bit vectors instead of classes representing sets of subsets Catching true&false as soon as it occurs Implementing better strategies for choosing undefined literals Most-AND and Weighted-AND Heuristic complexity of the resulting algorithm: O(1.71 n ) The best #SAT -solver works in time O( n ) Fast approximation using a custom genetic algorithm At least 89% accuracy within 2 seconds for the trees with less than 30 leaves
33 Fig. 1. Performance test results Comparing Strategies Average running time in seconds, logarithmic scale random strategy weighted-2-and strategy weighted-0.5-and strategy weighted-1-and strategy O(1.71 n ) Number of leaves in the tree
34 Fig. 2. Accuracy of genetics algorithm with p =2n and g =2n Accuracy of the Genetic Algorithm 1 Accuracy of the genetics results Number of leaves in the tree
35 Jürgenson & Willemson, 2009 Introduction of the serial model Semi-adaptive, non-blocking case, i.e. The attacker fixes the order of the elementary attacks in advance He is allowed to skip the elementary attacks that have become useless No failure blocks the entire execution
36 Attacker s Choices & Decrypt company secrets Obtain encrypted file & Obtain the password Bribe sysadmin Hack system Steal backup Install keylogger t
37 Outcome in the Serial Model (I) The expected outcome of the attack based on permutation α is Outcome α = p α Gains p α,i Expenses i, X i X where p α is the success probability of the primary threat and p α,i denotes the probability that the node X i
38 Outcome in the Serial Model (I) The expected outcome of the attack based on permutation α is Outcome α = p α Gains p α,i Expenses i, X i X where p α is the success probability of the primary threat and p α,i denotes the probability that the node X i Theorem Let F 1 and F 2 be two monotone Boolean formulae such that F 1 F 2, and let Outcome 1 α and Outcome 2 α be the expected outcomes obtained running the algorithm on the corresponding formulae using the leaf set permutation α. Then Outcome 1 α = Outcome 2 α.
39 Outcome in the Serial Model (II) Theorem We have Outcome JW09 Outcome JW08. If for all the elementary attacks X i (i = 1,..., n) one also has Expenses i > 0, then strict inequality holds in the above inequality.
40 Outcome in the Serial Model (II) Theorem We have Outcome JW09 Outcome JW08. If for all the elementary attacks X i (i = 1,..., n) one also has Expenses i > 0, then strict inequality holds in the above inequality. The naïve algorithm for computing the attacker s outcome is average-case exponential in the number of leaves n We propose an efficient algorithm with complexity O(n 2 ) Recall, need only the quantities p α and p α,i
41 The Algorithm & t = 0 f = 1 p 2 u = p 2 t = p 1 f = 0 u = 1 p 1 & t = 0 f = 1 p 2 u = p 2 X 1 t = p 1 f = 1 p 1 u = 0 X 2 t = p 2 f = 1 p 2 u = 0 p α,3 = (1 p 1 ) (1 (1 p 2 )) X 3 t = 0 f = 0 u = 1 X 4 t = 0 f = 0 u = 1 t
42 Sequential model revised Jürgenson&Willemson, 2009, builds on another framework: The attacker tries to first, maximize success probability second, achieve the best possible outcome Hence, a certain form of irrational behavior is obtained
43 Sequential model revised Jürgenson&Willemson, 2009, builds on another framework: The attacker tries to first, maximize success probability second, achieve the best possible outcome Hence, a certain form of irrational behavior is obtained Niitsoo, 2010 analyzes the rational case Builds on classical decision theory Attacks can be skipped if they are too expensive Otherwise same as JW09 Order of attacks fixed before the attack Full information about the past
44 Sequential model computation Decision tree optimization algorithm Decision trees usually exponential in general Attack trees provide for a simple structure We do not optimize Trees but BDD-s Non-crossing orders optimized in O(n) time. Modeling goal-oriented behavior Optimal non-crossing order for JW10 can be found in O(n lg n) time (Niitsoo, 2010)
45 Fully rational model Pros: Fully rational behavior (easy to justify) Optimal subset found automatically Highest expected utility of all models to date Efficient O(n) computation for some orders Highly extensible: Blocking case (even partial blocking) Bribes and uncertainty Intermediate payments Cons: Computation exponential for some orders Still only semi-adaptive Conventional
Upper Bounds for Adversaries Utility in Attack Trees
Upper Bounds for Adversaries Utility in Attack Trees Ahto Buldas 1,2,3, and Roman Stepanenko 2 1 Cybernetica AS 2 Tallinn University of Technology 3 Guardtime AS Abstract. Attack trees model the decision
More informationAutomated Program Verification and Testing 15414/15614 Fall 2016 Lecture 3: Practical SAT Solving
Automated Program Verification and Testing 15414/15614 Fall 2016 Lecture 3: Practical SAT Solving Matt Fredrikson mfredrik@cs.cmu.edu October 17, 2016 Matt Fredrikson SAT Solving 1 / 36 Review: Propositional
More informationCOMP219: Artificial Intelligence. Lecture 20: Propositional Reasoning
COMP219: Artificial Intelligence Lecture 20: Propositional Reasoning 1 Overview Last time Logic for KR in general; Propositional Logic; Natural Deduction Today Entailment, satisfiability and validity Normal
More informationThe Class NP. NP is the problems that can be solved in polynomial time by a nondeterministic machine.
The Class NP NP is the problems that can be solved in polynomial time by a nondeterministic machine. NP The time taken by nondeterministic TM is the length of the longest branch. The collection of all
More informationan information-theoretic model for adaptive side-channel attacks
an information-theoretic model for adaptive side-channel attacks Boris Köpf, David Basin ETH Zurich, Switzerland successful side-channel attacks Attacker must be able to extract information about the key
More informationPrice: $25 (incl. T-Shirt, morning tea and lunch) Visit:
Three days of interesting talks & workshops from industry experts across Australia Explore new computing topics Network with students & employers in Brisbane Price: $25 (incl. T-Shirt, morning tea and
More informationProblem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26
Binary Search Introduction Problem Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Strategy 1: Random Search Randomly select a page until the page containing
More informationLecture December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about
0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 7 02 December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about Two-Player zero-sum games (min-max theorem) Mixed
More informationAlgorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University
Algorithms NP -Complete Problems Dong Kyue Kim Hanyang University dqkim@hanyang.ac.kr The Class P Definition 13.2 Polynomially bounded An algorithm is said to be polynomially bounded if its worst-case
More informationLogic in Automatic Verification
Logic in Automatic Verification Javier Esparza Sofware Reliability and Security Group Institute for Formal Methods in Computer Science University of Stuttgart Many thanks to Abdelwaheb Ayari, David Basin,
More informationLimitations of Algorithm Power
Limitations of Algorithm Power Objectives We now move into the third and final major theme for this course. 1. Tools for analyzing algorithms. 2. Design strategies for designing algorithms. 3. Identifying
More informationComputational Logic. Davide Martinenghi. Spring Free University of Bozen-Bolzano. Computational Logic Davide Martinenghi (1/30)
Computational Logic Davide Martinenghi Free University of Bozen-Bolzano Spring 2010 Computational Logic Davide Martinenghi (1/30) Propositional Logic - sequent calculus To overcome the problems of natural
More informationSpeculative Parallelism in Cilk++
Speculative Parallelism in Cilk++ Ruben Perez & Gregory Malecha MIT May 11, 2010 Ruben Perez & Gregory Malecha (MIT) Speculative Parallelism in Cilk++ May 11, 2010 1 / 33 Parallelizing Embarrassingly Parallel
More information6. Logical Inference
Artificial Intelligence 6. Logical Inference Prof. Bojana Dalbelo Bašić Assoc. Prof. Jan Šnajder University of Zagreb Faculty of Electrical Engineering and Computing Academic Year 2016/2017 Creative Commons
More informationLecture 20: conp and Friends, Oracles in Complexity Theory
6.045 Lecture 20: conp and Friends, Oracles in Complexity Theory 1 Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode:
More informationChapter 2. Reductions and NP. 2.1 Reductions Continued The Satisfiability Problem (SAT) SAT 3SAT. CS 573: Algorithms, Fall 2013 August 29, 2013
Chapter 2 Reductions and NP CS 573: Algorithms, Fall 2013 August 29, 2013 2.1 Reductions Continued 2.1.1 The Satisfiability Problem SAT 2.1.1.1 Propositional Formulas Definition 2.1.1. Consider a set of
More informationThe exam is closed book, closed calculator, and closed notes except your one-page crib sheet.
CS 188 Fall 2015 Introduction to Artificial Intelligence Final You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.
More informationLecture Notes on SAT Solvers & DPLL
15-414: Bug Catching: Automated Program Verification Lecture Notes on SAT Solvers & DPLL Matt Fredrikson André Platzer Carnegie Mellon University Lecture 10 1 Introduction In this lecture we will switch
More informationExact and Approximate Equilibria for Optimal Group Network Formation
Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich and Bugra Caskurlu Computer Science Department, RPI, 110 8th Street, Troy, NY 12180 {eanshel,caskub}@cs.rpi.edu Abstract.
More informationLecture 11: Non-Interactive Zero-Knowledge II. 1 Non-Interactive Zero-Knowledge in the Hidden-Bits Model for the Graph Hamiltonian problem
CS 276 Cryptography Oct 8, 2014 Lecture 11: Non-Interactive Zero-Knowledge II Instructor: Sanjam Garg Scribe: Rafael Dutra 1 Non-Interactive Zero-Knowledge in the Hidden-Bits Model for the Graph Hamiltonian
More information6.841/18.405J: Advanced Complexity Wednesday, February 12, Lecture Lecture 3
6.841/18.405J: Advanced Complexity Wednesday, February 12, 2003 Lecture Lecture 3 Instructor: Madhu Sudan Scribe: Bobby Kleinberg 1 The language MinDNF At the end of the last lecture, we introduced the
More informationPassword Cracking: The Effect of Bias on the Average Guesswork of Hash Functions
Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions Yair Yona, and Suhas Diggavi, Fellow, IEEE Abstract arxiv:608.0232v4 [cs.cr] Jan 207 In this work we analyze the average
More informationIE418 Integer Programming
IE418: Integer Programming Department of Industrial and Systems Engineering Lehigh University 2nd February 2005 Boring Stuff Extra Linux Class: 8AM 11AM, Wednesday February 9. Room??? Accounts and Passwords
More informationAlgorithmic Game Theory and Applications. Lecture 5: Introduction to Linear Programming
Algorithmic Game Theory and Applications Lecture 5: Introduction to Linear Programming Kousha Etessami real world example : the diet problem You are a fastidious eater. You want to make sure that every
More informationTutorial: Device-independent random number generation. Roger Colbeck University of York
Tutorial: Device-independent random number generation Roger Colbeck University of York Outline Brief motivation of random number generation Discuss what we mean by a random number Discuss some ways of
More informationDRAFT. Algebraic computation models. Chapter 14
Chapter 14 Algebraic computation models Somewhat rough We think of numerical algorithms root-finding, gaussian elimination etc. as operating over R or C, even though the underlying representation of the
More informationIntroduction to Cryptography Lecture 13
Introduction to Cryptography Lecture 13 Benny Pinkas June 5, 2011 Introduction to Cryptography, Benny Pinkas page 1 Electronic cash June 5, 2011 Introduction to Cryptography, Benny Pinkas page 2 Simple
More informationLearning Decision Trees
Learning Decision Trees Machine Learning Fall 2018 Some slides from Tom Mitchell, Dan Roth and others 1 Key issues in machine learning Modeling How to formulate your problem as a machine learning problem?
More informationSatisifiability and Probabilistic Satisifiability
Satisifiability and Probabilistic Satisifiability Department of Computer Science Instituto de Matemática e Estatística Universidade de São Paulo 2010 Topics Next Issue The SAT Problem The Centrality of
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 9 February 6, 2012 CPSC 467b, Lecture 9 1/53 Euler s Theorem Generating RSA Modulus Finding primes by guess and check Density of
More informationUnit 1A: Computational Complexity
Unit 1A: Computational Complexity Course contents: Computational complexity NP-completeness Algorithmic Paradigms Readings Chapters 3, 4, and 5 Unit 1A 1 O: Upper Bounding Function Def: f(n)= O(g(n)) if
More informationCOMP3702/7702 Artificial Intelligence Week 5: Search in Continuous Space with an Application in Motion Planning " Hanna Kurniawati"
COMP3702/7702 Artificial Intelligence Week 5: Search in Continuous Space with an Application in Motion Planning " Hanna Kurniawati" Last week" Main components of PRM" Collision check for a configuration"
More informationComputational Complexity and Intractability: An Introduction to the Theory of NP. Chapter 9
1 Computational Complexity and Intractability: An Introduction to the Theory of NP Chapter 9 2 Objectives Classify problems as tractable or intractable Define decision problems Define the class P Define
More informationLecture 21: Algebraic Computation Models
princeton university cos 522: computational complexity Lecture 21: Algebraic Computation Models Lecturer: Sanjeev Arora Scribe:Loukas Georgiadis We think of numerical algorithms root-finding, gaussian
More informationProbabilistic Assessment of Security Scenarios Challenges and Solutions
Probabilistic Assessment of Security Scenarios Challenges and Solutions Barbara Kordy Joint work with Marc Pouly, Patrick Schweitzer Formal Methods and Security seminar INRIA Rennes, May 16, 2014 Barbara
More informationChapter 7 R&N ICS 271 Fall 2017 Kalev Kask
Set 6: Knowledge Representation: The Propositional Calculus Chapter 7 R&N ICS 271 Fall 2017 Kalev Kask Outline Representing knowledge using logic Agent that reason logically A knowledge based agent Representing
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 10 February 19, 2013 CPSC 467b, Lecture 10 1/45 Primality Tests Strong primality tests Weak tests of compositeness Reformulation
More informationFINAL EXAM: FALL 2013 CS 6375 INSTRUCTOR: VIBHAV GOGATE
FINAL EXAM: FALL 2013 CS 6375 INSTRUCTOR: VIBHAV GOGATE You are allowed a two-page cheat sheet. You are also allowed to use a calculator. Answer the questions in the spaces provided on the question sheets.
More informationComputer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms
Computer Science 385 Analysis of Algorithms Siena College Spring 2011 Topic Notes: Limitations of Algorithms We conclude with a discussion of the limitations of the power of algorithms. That is, what kinds
More informationCS 6375 Machine Learning
CS 6375 Machine Learning Decision Trees Instructor: Yang Liu 1 Supervised Classifier X 1 X 2. X M Ref class label 2 1 Three variables: Attribute 1: Hair = {blond, dark} Attribute 2: Height = {tall, short}
More informationLecture 2: Symbolic Model Checking With SAT
Lecture 2: Symbolic Model Checking With SAT Edmund M. Clarke, Jr. School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 (Joint work over several years with: A. Biere, A. Cimatti, Y.
More informationSolvers for the Problem of Boolean Satisfiability (SAT) Will Klieber Aug 31, 2011
Solvers for the Problem of Boolean Satisfiability (SAT) Will Klieber 15-414 Aug 31, 2011 Why study SAT solvers? Many problems reduce to SAT. Formal verification CAD, VLSI Optimization AI, planning, automated
More informationLecture 7: ElGamal and Discrete Logarithms
Lecture 7: ElGamal and Discrete Logarithms Johan Håstad, transcribed by Johan Linde 2006-02-07 1 The discrete logarithm problem Recall that a generator g of a group G is an element of order n such that
More informationIntelligent Agents. Formal Characteristics of Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University
Intelligent Agents Formal Characteristics of Planning Ute Schmid Cognitive Systems, Applied Computer Science, Bamberg University Extensions to the slides for chapter 3 of Dana Nau with contributions by
More informationOptimization and Complexity
Optimization and Complexity Decision Systems Group Brigham and Women s Hospital, Harvard Medical School Harvard-MIT Division of Health Sciences and Technology Aim Give you an intuition of what is meant
More informationModel Checking with CTL. Presented by Jason Simas
Model Checking with CTL Presented by Jason Simas Model Checking with CTL Based Upon: Logic in Computer Science. Huth and Ryan. 2000. (148-215) Model Checking. Clarke, Grumberg and Peled. 1999. (1-26) Content
More information1 Introduction (January 21)
CS 97: Concrete Models of Computation Spring Introduction (January ). Deterministic Complexity Consider a monotonically nondecreasing function f : {,,..., n} {, }, where f() = and f(n) =. We call f a step
More informationMidterm 2. Your Exam Room: Name of Person Sitting on Your Left: Name of Person Sitting on Your Right: Name of Person Sitting in Front of You:
CS70 Discrete Mathematics and Probability Theory, Fall 2018 Midterm 2 8:00-10:00pm, 31 October Your First Name: SIGN Your Name: Your Last Name: Your SID Number: Your Exam Room: Name of Person Sitting on
More information1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT
1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations
More informationINAPPROX APPROX PTAS. FPTAS Knapsack P
CMPSCI 61: Recall From Last Time Lecture 22 Clique TSP INAPPROX exists P approx alg for no ε < 1 VertexCover MAX SAT APPROX TSP some but not all ε< 1 PTAS all ε < 1 ETSP FPTAS Knapsack P poly in n, 1/ε
More informationA Mathematical Theory of Communication
A Mathematical Theory of Communication Ben Eggers Abstract This paper defines information-theoretic entropy and proves some elementary results about it. Notably, we prove that given a few basic assumptions
More informationQuantitative Verification and Synthesis of Attack-Defence Scenarios
Quantitative Verification and Synthesis of Attack-Defence Scenarios Zaruhi Aslanyan, Flemming Nielson DTU Compute Technical University of Denmark Denmark Email: {zaas,fnie}@dtu.dk David Parker School of
More informationNotes for Lecture 21
U.C. Berkeley CS170: Intro to CS Theory Handout N21 Professor Luca Trevisan November 20, 2001 Notes for Lecture 21 1 Tractable and Intractable Problems So far, almost all of the problems that we have studied
More informationChapter 3 Deterministic planning
Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions
More informationCritical Reading of Optimization Methods for Logical Inference [1]
Critical Reading of Optimization Methods for Logical Inference [1] Undergraduate Research Internship Department of Management Sciences Fall 2007 Supervisor: Dr. Miguel Anjos UNIVERSITY OF WATERLOO Rajesh
More informationAutomata Theory CS Complexity Theory I: Polynomial Time
Automata Theory CS411-2015-17 Complexity Theory I: Polynomial Time David Galles Department of Computer Science University of San Francisco 17-0: Tractable vs. Intractable If a problem is recursive, then
More informationMultiparty Computation (MPC) Arpita Patra
Multiparty Computation (MPC) Arpita Patra MPC offers more than Traditional Crypto! > MPC goes BEYOND traditional Crypto > Models the distributed computing applications that simultaneously demands usability
More informationComputational Complexity Theory
Computational Complexity Theory Marcus Hutter Canberra, ACT, 0200, Australia http://www.hutter1.net/ Assumed Background Preliminaries Turing Machine (TM) Deterministic Turing Machine (DTM) NonDeterministic
More informationComputability and Complexity Theory: An Introduction
Computability and Complexity Theory: An Introduction meena@imsc.res.in http://www.imsc.res.in/ meena IMI-IISc, 20 July 2006 p. 1 Understanding Computation Kinds of questions we seek answers to: Is a given
More informationExact and Approximate Equilibria for Optimal Group Network Formation
Noname manuscript No. will be inserted by the editor) Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich Bugra Caskurlu Received: December 2009 / Accepted: Abstract
More informationPropositional Logic. Methods & Tools for Software Engineering (MTSE) Fall Prof. Arie Gurfinkel
Propositional Logic Methods & Tools for Software Engineering (MTSE) Fall 2017 Prof. Arie Gurfinkel References Chpater 1 of Logic for Computer Scientists http://www.springerlink.com/content/978-0-8176-4762-9/
More informationFoundations of Artificial Intelligence
Foundations of Artificial Intelligence 31. Propositional Logic: DPLL Algorithm Malte Helmert and Gabriele Röger University of Basel April 24, 2017 Propositional Logic: Overview Chapter overview: propositional
More informationNP-complete problems. CSE 101: Design and Analysis of Algorithms Lecture 20
NP-complete problems CSE 101: Design and Analysis of Algorithms Lecture 20 CSE 101: Design and analysis of algorithms NP-complete problems Reading: Chapter 8 Homework 7 is due today, 11:59 PM Tomorrow
More informationPOLYNOMIAL SPACE QSAT. Games. Polynomial space cont d
T-79.5103 / Autumn 2008 Polynomial Space 1 T-79.5103 / Autumn 2008 Polynomial Space 3 POLYNOMIAL SPACE Polynomial space cont d Polynomial space-bounded computation has a variety of alternative characterizations
More information#A32 INTEGERS 10 (2010), TWO NEW VAN DER WAERDEN NUMBERS: w(2; 3, 17) AND w(2; 3, 18)
#A32 INTEGERS 10 (2010), 369-377 TWO NEW VAN DER WAERDEN NUMBERS: w(2; 3, 17) AND w(2; 3, 18) Tanbir Ahmed ConCoCO Research Laboratory, Department of Computer Science and Software Engineering, Concordia
More informationP P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions
Summary of the previous lecture Recall that we mentioned the following topics: P: is the set of decision problems (or languages) that are solvable in polynomial time. NP: is the set of decision problems
More informationCS6375: Machine Learning Gautam Kunapuli. Decision Trees
Gautam Kunapuli Example: Restaurant Recommendation Example: Develop a model to recommend restaurants to users depending on their past dining experiences. Here, the features are cost (x ) and the user s
More informationSAT Solvers: Theory and Practice
Summer School on Verification Technology, Systems & Applications, September 17, 2008 p. 1/98 SAT Solvers: Theory and Practice Clark Barrett barrett@cs.nyu.edu New York University Summer School on Verification
More informationTowards a General Theory of Non-Cooperative Computation
Towards a General Theory of Non-Cooperative Computation (Extended Abstract) Robert McGrew, Ryan Porter, and Yoav Shoham Stanford University {bmcgrew,rwporter,shoham}@cs.stanford.edu Abstract We generalize
More informationCS 5114: Theory of Algorithms. Tractable Problems. Tractable Problems (cont) Decision Problems. Clifford A. Shaffer. Spring 2014
Department of Computer Science Virginia Tech Blacksburg, Virginia Copyright c 2014 by Clifford A. Shaffer : Theory of Algorithms Title page : Theory of Algorithms Clifford A. Shaffer Spring 2014 Clifford
More informationNP Completeness. CS 374: Algorithms & Models of Computation, Spring Lecture 23. November 19, 2015
CS 374: Algorithms & Models of Computation, Spring 2015 NP Completeness Lecture 23 November 19, 2015 Chandra & Lenny (UIUC) CS374 1 Spring 2015 1 / 37 Part I NP-Completeness Chandra & Lenny (UIUC) CS374
More informationAnalysis of Algorithms. Unit 5 - Intractable Problems
Analysis of Algorithms Unit 5 - Intractable Problems 1 Intractable Problems Tractable Problems vs. Intractable Problems Polynomial Problems NP Problems NP Complete and NP Hard Problems 2 In this unit we
More informationBoolean decision diagrams and SAT-based representations
Boolean decision diagrams and SAT-based representations 4th July 200 So far we have seen Kripke Structures 2 Temporal logics (and their semantics over Kripke structures) 3 Model checking of these structures
More informationToday: Linear Programming (con t.)
Today: Linear Programming (con t.) COSC 581, Algorithms April 10, 2014 Many of these slides are adapted from several online sources Reading Assignments Today s class: Chapter 29.4 Reading assignment for
More informationLimits of Feasibility. Example. Complexity Relationships among Models. 1. Complexity Relationships among Models
Limits of Feasibility Wolfgang Schreiner Wolfgang.Schreiner@risc.jku.at Research Institute for Symbolic Computation (RISC) Johannes Kepler University, Linz, Austria http://www.risc.jku.at 1. Complexity
More informationA Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
1 / 35 A Stochastic Framework for Quantitative Analysis of R. Jhawar K. Lounis S. Mauw CSC/SnT University of Luxembourg Luxembourg Security and Trust of Software Systems, 2016 ADT2P & TREsPASS Project
More informationSAT, NP, NP-Completeness
CS 473: Algorithms, Spring 2018 SAT, NP, NP-Completeness Lecture 22 April 13, 2018 Most slides are courtesy Prof. Chekuri Ruta (UIUC) CS473 1 Spring 2018 1 / 57 Part I Reductions Continued Ruta (UIUC)
More informationA An Overview of Complexity Theory for the Algorithm Designer
A An Overview of Complexity Theory for the Algorithm Designer A.1 Certificates and the class NP A decision problem is one whose answer is either yes or no. Two examples are: SAT: Given a Boolean formula
More informationHarvard CS 121 and CSCI E-121 Lecture 22: The P vs. NP Question and NP-completeness
Harvard CS 121 and CSCI E-121 Lecture 22: The P vs. NP Question and NP-completeness Harry Lewis November 19, 2013 Reading: Sipser 7.4, 7.5. For culture : Computers and Intractability: A Guide to the Theory
More informationSMT Unsat Core Minimization
SMT Unsat Core Minimization O F E R G U T H M A N N, O F E R S T R I C H M A N, A N N A T R O S TA N E T S K I F M C A D 2 0 1 6 1 Satisfiability Modulo Theories Satisfiability Modulo Theories (SMT): decides
More informationSynthesis of Designs from Property Specifications
Synthesis of Designs from Property Specifications Amir Pnueli New York University and Weizmann Institute of Sciences FMCAD 06 San Jose, November, 2006 Joint work with Nir Piterman, Yaniv Sa ar, Research
More informationCS21 Decidability and Tractability
CS21 Decidability and Tractability Lecture 18 February 16, 2018 February 16, 2018 CS21 Lecture 18 1 Outline the complexity class NP 3-SAT is NP-complete NP-complete problems: independent set, vertex cover,
More informationUmans Complexity Theory Lectures
Umans Complexity Theory Lectures Lecture 12: The Polynomial-Time Hierarchy Oracle Turing Machines Oracle Turing Machine (OTM): Deterministic multitape TM M with special query tape special states q?, q
More informationHeuristics for Efficient SAT Solving. As implemented in GRASP, Chaff and GSAT.
Heuristics for Efficient SAT Solving As implemented in GRASP, Chaff and GSAT. Formulation of famous problems as SAT: k-coloring (1/2) The K-Coloring problem: Given an undirected graph G(V,E) and a natural
More informationAn instance of SAT is defined as (X, S)
SAT: Propositional Satisfiability 22c:45 Artificial Intelligence Russell & Norvig, Ch. 7.6 Validity vs. Satisfiability Validity: A sentence is valid if it is true in every interpretation (every interpretation
More informationSearch and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012
Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Search and Lookahead Enforcing consistency is one way of solving constraint networks:
More informationRecoverable Robustness in Scheduling Problems
Master Thesis Computing Science Recoverable Robustness in Scheduling Problems Author: J.M.J. Stoef (3470997) J.M.J.Stoef@uu.nl Supervisors: dr. J.A. Hoogeveen J.A.Hoogeveen@uu.nl dr. ir. J.M. van den Akker
More informationFully Homomorphic Encryption and Bootstrapping
Fully Homomorphic Encryption and Bootstrapping Craig Gentry and Shai Halevi June 3, 2014 China Summer School on Lattices and Cryptography Fully Homomorphic Encryption (FHE) A FHE scheme can evaluate unbounded
More informationComplete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in
Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single
More informationColumn Generation. i = 1,, 255;
Column Generation The idea of the column generation can be motivated by the trim-loss problem: We receive an order to cut 50 pieces of.5-meter (pipe) segments, 250 pieces of 2-meter segments, and 200 pieces
More informationA survey on quantum-secure cryptographic systems
A survey on quantum-secure cryptographic systems Tomoka Kan May 24, 2018 1 Abstract Post-quantum cryptography refers to the search for classical cryptosystems which remain secure in the presence of a quantum
More informationCOMP Analysis of Algorithms & Data Structures
COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Computational Complexity CLRS 34.1-34.4 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 50 Polynomial
More informationSOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies
SOBER Cryptanalysis Daniel Bleichenbacher and Sarvar Patel {bleichen,sarvar}@lucent.com Bell Laboratories Lucent Technologies Abstract. SOBER is a new stream cipher that has recently been developed by
More informationEssential facts about NP-completeness:
CMPSCI611: NP Completeness Lecture 17 Essential facts about NP-completeness: Any NP-complete problem can be solved by a simple, but exponentially slow algorithm. We don t have polynomial-time solutions
More informationPropositional Logic: Models and Proofs
Propositional Logic: Models and Proofs C. R. Ramakrishnan CSE 505 1 Syntax 2 Model Theory 3 Proof Theory and Resolution Compiled at 11:51 on 2016/11/02 Computing with Logic Propositional Logic CSE 505
More informationLecture 2 Propositional Logic & SAT
CS 5110/6110 Rigorous System Design Spring 2017 Jan-17 Lecture 2 Propositional Logic & SAT Zvonimir Rakamarić University of Utah Announcements Homework 1 will be posted soon Propositional logic: Chapter
More informationDecision Procedures for Satisfiability and Validity in Propositional Logic
Decision Procedures for Satisfiability and Validity in Propositional Logic Meghdad Ghari Institute for Research in Fundamental Sciences (IPM) School of Mathematics-Isfahan Branch Logic Group http://math.ipm.ac.ir/isfahan/logic-group.htm
More informationBayesian networks in Mastermind
Bayesian networks in Mastermind Jiří Vomlel http://www.utia.cas.cz/vomlel/ Laboratory for Intelligent Systems Inst. of Inf. Theory and Automation University of Economics Academy of Sciences Ekonomická
More informationSynthesis of 2-level Logic Exact and Heuristic Methods. Two Approaches
Synthesis of 2-level Logic Exact and Heuristic Methods Lecture 7: Branch & Bound Exact Two Approaches Find all primes Find a complete sum Find a minimum cover (covering problem) Heuristic Take an initial
More informationHardness of Mastermind
Giovanni Viglietta Department of Computer Science, University of Pisa, Italy Pisa - January 19 th, 2011 Easy to learn. Easy to play. But not so easy to win. Mastermind commercial, 1981 Mastermind is played
More information