Angelo Troina. Joint work with: Ruggero Lanotte (University of Insubria at Como) Andrea Maggiolo Schettini (University of Pisa)

Size: px
Start display at page:

Download "Angelo Troina. Joint work with: Ruggero Lanotte (University of Insubria at Como) Andrea Maggiolo Schettini (University of Pisa)"

Transcription

1 Angelo Troina Dipartimento di Informatica, Università di Pisa, Italy Probabilistic Joint work with: Ruggero Lanotte (University of Insubria at Como) Andrea Maggiolo Schettini (University of Pisa) 1/23

2 Outline Multilevel Security Non-Interference [Goguen and Meseguer,1982] The Model Probabilistic Timed Automata Weak Bisimulation for Probabilistic Timed Automata Probabilistic and/or Timed Security Properties Probabilistic 2/23

3 Security in Multilevel General setting: a multilevel system, i.e. a system of interacting agents where every agent is confined in a bounded security level. Access rules: can be imposed to control direct unwanted transmissions from higher levels to lower levels. Covert channels: information could be transmitted from higher levels to lower levels by using system side effects. Aim: to control the whole flow of information : low level agents are not able to deduce anything about the activity of high level agents. Probabilistic 3/23

4 systems J. A. Goguen, J. Meseguer: Security Policy and Security Models. Proc. of Symp. on Research in Security and Privacy, IEEE CS Press, 11 20, D. McCullough: Noninterference and the Composability of Security Properties. Proc. of Symp. on Research in Security and Privacy, IEEE CS Press, , R. Focardi, R. Gorrieri: A Classification of Security Properties. Journal of Computer Security 3, 5 33, Probabilistic 4/23

5 Timed systems R. Focardi, R. Gorrieri, F. Martinelli: in a Discrete-Time Process Algebra. Proc. of 13th CSFW, IEEE CS Press, , N. Evans, S. Schneider: Analysing Time Dependent Security Properties in CSP Using PVS. Proc. of Symp. on Research in Computer Security, Springer LNCS 1895, , R. Barbuti, L. Tesei: A Decidable Notion of Timed. Fundamenta Informaticae 54, , Probabilistic 5/23

6 Probabilistic systems J. W. Gray III. Toward a Mathematical Foundation for Security. Journal of Computer Security 1, , A. Aldini, M. Bravetti, R. Gorrieri: A Process-algebraic Approach for the of Probabilistic. Journal of Computer Security 12, , A. Di Pierro, C. Hankin, H. Wiklicky: Approximate Non-Interference. Journal of Computer Security 12, 37-82, Probabilistic 6/23

7 A Probabilistic Timed Automaton (PTA) is A = (Σ, X, Q, q 0, δ, π). q0 a, 1 2 b, 1 2 x = 5 x = 5 q1 q2 Probabilistic A configuration of a PTA is a pair s = (q, v), where q Q is a state, and v is a valuation over X. 7/23

8 Weak Bisimulation of Probabilistic Timed Automata A weak bisimulation is a bisimulation which does not take care of internal moves. For a PTA A = (Σ, X, Q, q 0, δ, π) a weak bisimulation is an equivalence relation R such that, for all (s, s ) R and equivalence classes C of R: Probabilistic Prob(s, τ α, C) = Prob(s, τ α, C) α Σ {τ} IR >0 Two configurations s, s are weak bisimilar (s s ) iff (s, s ) R for some weak bisimulation R. 8/23

9 Weak Bisimulation of Probabilistic Timed Automata (2) τ, 1 3 q0 r0 a, 1 2 b, 1 2 a, 1 3 b, 1 3 x = 5 x = 5 z = 5 z = 5 q1 q2 r1 r2 A 1 A 2 Probabilistic Figure: A 1 A 2. 9/23

10 Auxiliary operators for Probabilistic Timed Automata Given two PTA A 1 and A 2, L Σ set of synchronization actions and p ]0, 1[ advancing speed parameter, A 1 p L A 2 denotes the parallel composition. The composition is a PTA obtained by normalizing probabilities and hiding with the τ label the synchronized actions. The restriction of a PTA A with respect to the set of actions L is A \ L, obtained from A by removing transitions and normalization of probabilities. Probabilistic The hiding of a PTA A with respect to the set of actions L is A/L where each transition label a L is replaced by label τ. 10/23

11 A system S satisfies the property (S NI ) if high level agents do not interfere with the observable behavior of the system from the low level point of view: S NI S/Σ H S \ Σ H where Σ H is the set of high level actions. (The observable behavior of the isolated system is bisimilar to the behavior of the system which communicates with high level agents in an invisible manner for the low agent point of view). Probabilistic Proposition. It is decidable to check whether a system S satisfies the NI property. 11/23

12 An example of non-deterministic covert channel. q 0 l q 2 h q 1 l q 3 q 0 l q 2 q 0 l q 2 τ A A \ Σ H A/Σ H q 1 l q 3 Probabilistic The high level action h interferes with the observation of the action l. In A \ Σ H the low level agent observes only the execution of l, whereas, in A/Σ H also action l may be observed. A low level agent, observing the event l knows that action h has occurred. 12/23

13 Timed An example of timing covert channel. h τ q 0 q 1 q 0 q 0 q 1 l x = 0 l x = 5 l x = 0 l x = 0 l x = 5 q 2 q 3 q 2 q 2 q 3 A A \ Σ H A/Σ H Probabilistic The high level action h interferes with the time of observing the action l. In A \ Σ H the low level agent observes l executed immediately, whereas, in A/Σ H l could either be observed immediately or when the clock x reaches value 5. A low level agent, observing the event l when clock x has value 5 knows that action h has occurred. 13/23

14 Probabilistic q 1 q 1 q 1 l, p l, p l, p q 0 l, q q 2 l, r q 3 h q 5 q 0 l, q q 2 l, r q 3 q 0 l, q q 2 l, r q 3 τ q 5 Probabilistic l q 4 l q 6 l q 4 l q 4 l q 6 A A \ Σ H A/Σ H A \ Σ H : l is obsevred with probability p + r, ll with probability q. A/Σ H : l is observed with probability p, ll with probability r + q. 14/23

15 A Classification of Quantitative Security Properties Given NNI, TNI, PNI and PTNI be non-interference properties defined for the models of non-deterministic automata, timed automata, probabilistic automata and probabilistic timed automata, respectively, the following implications hold: A PNI unprob(a) NNI A TNI untime(a) NNI A PTNI unprob(a) TNI untime(a) PNI. Probabilistic 15/23

16 A Classification of Quantitative Security Properties (2) A : A PTNI unprob(a) TNI untime(a) PNI A A \ Σ H A/Σ H l q 1 q l 7 x = 3 τ, 1 x = 3 q 9 3 q h, 0 1 τ, q 3 τ, 1 3 q l 4 q 2 x = 4 q 5 τ, 1 10 q l 6 x = 4 q 8 l q 1 x = 3 q 3 τ, 1 2 q 0 τ, 1 2 q l 4 q 2 x = 4 l q 1 x = 3 q 3 τ, 1 3 q 0 τ, 1 3 q l 4 q 2 x = 4 q l 7 x = 3 q 9 τ, 1 τ, q 5 τ, 1 10 l x = 4 q 8 q 6 Probabilistic A \ Σ H : l when x = 3 or when x = 4 with probability 1 2. A/Σ H : l when x = 3 with probability 19 30, l when x = 4 with probability /23

17 A Classification of Quantitative Security Properties (3) The following diagram summarizes our results. PNI PTNI TNI NNI Probabilistic Figure: Relations among Non-Interference security properties. 17/23

18 A system S satisfies the (NDC) if the system in isolation has not to be altered when considering all the potential interactions with the high level agents of the external environment, formally: S NDC Π Γ H, p ]0, 1[, L Σ H S/Σ H (S p L Π) \ Σ H where Γ H is the set of high level agents. (The observable behavior of the isolated system is bisimilar to the behavior of the system communicating with the high level agent Π in an invisible manner for the low agent point of view). Probabilistic Note. Decidability of NDC depends on the possibility of reducing all the high level automata in Γ H to a finite case for the particular automaton S considered. 18/23

19 (2) Theorem. S mndc S mni. h, q q h 1 q 3 q 0 τ, q q τ 1 q 3 l, 1 2 q 2 l q 4 l q 2 l, 1 2 q 2 A A \ Σ H A/Σ H l q 4 Probabilistic r 0 h r 1 τ, 3 4 r 0 l, 1 4 r 2 r 1 Π (A p L Π) \ Σ H A is PTNI secure, since A/Σ H A \ Σ H. But A is not PTNDC secure as (A p L Π) \ Σ H reaches with probability 3 4 a state where it cannot perform any visible action. 19/23

20 A Classification of Quantitative Security Properties(4) Given NNDC, TNDC, PNDC and PTNDC be non-deducibility on composition properties defined for the models of non-deterministic automata, timed automata, probabilistic automata and probabilistic timed automata, respectively, the following implication holds: A PTNDC (PNDC, TNDC, NNDC) A PTNI (PNI, TNI, NNI). Moreover, as for the NI properties, we have that: A PNDC unprob(a) NNDC; A TNDC untime(a) NNDC; A PTNDC unprob(a) TNDC untime(a) PNDC. and that A : A PTNDC unprob(a) TNDC untime(a) PNDC. Probabilistic 20/23

21 A Classification of Quantitative Security Properties (5) PNI NNDC PNDC TNDC NNI TNI Probabilistic PTNI PTNDC 21/23

22 Observations and Future Work Introduce an approximated notion of weak bisimulation for PTA. We can formulate other well known information flow security properties within our framework. Extend the model with cryptographic primitives in order to analyze security protocols. Develop an automatic technique to adjust unsecure systems. Probabilistic 22/23

23 Bibliography [1] R. Lanotte, A. Maggiolo-Schettini, A Classification of /or Probability Dependent Security Properties Proc. QAPL 05, Elsevier ENTCS, to appear. [2] R. Lanotte, A. Maggiolo-Schettini, for Probabilistic Timed Automata Proc. FAST 04, Springer IFIP series 173, pp , [3] R. Lanotte, A. Maggiolo-Schettini, Weak Bisimulation for Probabilistic Timed Automata and Applications to Security Proc. SEFM 03, IEEE Computer Society Press, pp , Probabilistic 23/23

Reachability Results for Timed Automata with Unbounded Data Structures

Reachability Results for Timed Automata with Unbounded Data Structures Acta Informatica manuscript No. (will be inserted by the editor) Reachability Results for Timed Automata with Unbounded Data Structures Ruggero Lanotte Andrea Maggiolo-Schettini Angelo Troina Received:

More information

Expressing Security Properties Using Selective Interleaving Functions

Expressing Security Properties Using Selective Interleaving Functions Expressing Security Properties Using Selective Interleaving Functions Joseph Halpern and Sabina Petride August 8, 2008 Abstract McLean s notion of Selective Interleaving Functions (SIFs) is perhaps the

More information

Design and Verification of Long Running Transactions in a Timed Framework

Design and Verification of Long Running Transactions in a Timed Framework Design and Verification of Long Running Transactions in a Timed Framework Ruggero Lanotte a, Andrea Maggiolo Schettini b, Paolo Milazzo b, Angelo Troina c, a Dipartimento di Scienze della Cultura, Politiche

More information

A Framework for. Security Analysis. with Team Automata

A Framework for. Security Analysis. with Team Automata A Framework for Security Analysis with Team Automata Marinella Petrocchi Istituto di Informatica e Telematica National Research Council IIT-CNR Pisa, Italy Tuesday 8 June 2004 DIMACS with Maurice ter Beek

More information

Formal Methods and Systems Biology: The Calculus of Looping Sequences

Formal Methods and Systems Biology: The Calculus of Looping Sequences Formal Methods and Systems Biology: The Calculus of Looping Sequences Paolo Milazzo Dipartimento di Informatica, Università di Pisa, Italy Verona January 22, 2008 Paolo Milazzo (Università di Pisa) Formal

More information

Distributed Knowledge and Information Flow Security

Distributed Knowledge and Information Flow Security Distributed Knowledge and Information Flow Security School of Computer Science and Engineering, University of New South Wales Sydney, Australia meyden@cse.unsw.edu.au http://www.cse.unsw.edu.au/ meyden

More information

Timed Automata VINO 2011

Timed Automata VINO 2011 Timed Automata VINO 2011 VeriDis Group - LORIA July 18, 2011 Content 1 Introduction 2 Timed Automata 3 Networks of timed automata Motivation Formalism for modeling and verification of real-time systems.

More information

Non-interference. Christoph Sprenger and Sebastian Mödersheim. FMSEC Module 11, v.2 November 30, Department of Computer Science ETH Zurich

Non-interference. Christoph Sprenger and Sebastian Mödersheim. FMSEC Module 11, v.2 November 30, Department of Computer Science ETH Zurich Non-interference Christoph Sprenger and Sebastian Mödersheim Department of Computer Science ETH Zurich FMSEC Module 11, v.2 November 30, 2009 Outline 1 Basic Non-interference Unwinding Access Control Interpretations

More information

Program Analysis Probably Counts

Program Analysis Probably Counts Probably Counts 1 c.hankin@imperial.ac.uk joint work with Alessandra Di Pierro 2 and Herbert Wiklicky 1 1 Department of Computing, 2 Dipartimento di Informatica, Università di Verona Computer Journal Lecture,

More information

On Distribution Based Bisimulations for Probabilistic Automata

On Distribution Based Bisimulations for Probabilistic Automata On Distribution Based Bisimulations for Probabilistic Automata AVACS alumni technical talk Lijun Zhang Institute of Software, Chinese Academy of Sciences Joint work with Holger Hermanns, Lei Song, Christian

More information

Iit Istituto di Informatica e Telematica

Iit Istituto di Informatica e Telematica C Consiglio Nazionale delle Ricerche Specification and Analysis of Information Flow Properties for Distributed Systems R. Gorreri, F. Martinelli, I. Matteucci IIT TR-12/2010 Technical report Febbraio 2010

More information

EAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties

EAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties EAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties Bernd Finkbeiner, Christopher Hahn, and Marvin Stenger Saarland Informatics Campus, Saarland University, Saarbrücken, Germany

More information

The State Explosion Problem

The State Explosion Problem The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis

More information

The Complexity of Intransitive Noninterference

The Complexity of Intransitive Noninterference The Complexity of Intransitive Noninterference Sebastian Eggert, Ron van der Meyden, Henning Schnoor, Thomas Wilke Institut für Informatik, Kiel University School of Computer Science and Engineering, University

More information

Time-Bounding Needham-Schroeder Public Key Exchange Protocol

Time-Bounding Needham-Schroeder Public Key Exchange Protocol Time-Bounding Needham-Schroeder Public Key Exchange Protocol Max Kanovich, Queen Mary, University of London, UK University College London, UCL-CS, UK Tajana Ban Kirigin, University of Rijeka, HR Vivek

More information

Abstract Non-Interference - An Abstract Interpretation-based approach to Secure Information Flow

Abstract Non-Interference - An Abstract Interpretation-based approach to Secure Information Flow Isabella Mastroeni Abstract Non-Interference - An Abstract Interpretation-based approach to Secure Information Flow Ph.D. Thesis 31 Marzo 2005 Università degli Studi di Verona Dipartimento di Informatica

More information

A Weak Bisimulation for Weighted Automata

A Weak Bisimulation for Weighted Automata Weak Bisimulation for Weighted utomata Peter Kemper College of William and Mary Weighted utomata and Semirings here focus on commutative & idempotent semirings Weak Bisimulation Composition operators Congruence

More information

State Explosion in Almost-Sure Probabilistic Reachability

State Explosion in Almost-Sure Probabilistic Reachability State Explosion in Almost-Sure Probabilistic Reachability François Laroussinie Lab. Spécification & Vérification, ENS de Cachan & CNRS UMR 8643, 61, av. Pdt. Wilson, 94235 Cachan Cedex France Jeremy Sproston

More information

Secrecy in Multiagent Systems

Secrecy in Multiagent Systems Secrecy in Multiagent Systems Joseph Y. Halpern & Kevin R. O Neill Department of Computer Science Cornell University halpern@cs.cornell.edu; kroneill@gmail.com We introduce a general framework for reasoning

More information

Quantifying Information Flow

Quantifying Information Flow Quantifying Information Flow Gavin owe February 5, 2002 Abstract We extend definitions of information flow so as to quantify the amount of information passed; in other words, we give a formal definition

More information

Decidability Results for Probabilistic Hybrid Automata

Decidability Results for Probabilistic Hybrid Automata Decidability Results for Probabilistic Hybrid Automata Prof. Dr. Erika Ábrahám Informatik 2 - Theory of Hybrid Systems RWTH Aachen SS09 - Probabilistic hybrid automata 1 / 17 Literatur Jeremy Sproston:

More information

Quantitative analysis of secure information flow via Probabilistic Semantics

Quantitative analysis of secure information flow via Probabilistic Semantics Quantitative analysis of secure information flow via Probabilistic Semantics Chunyan Mu Department of Computer Science King s College London The Strand, London WCR LS Email: Chunyan.Mu@kcl.ac.uk David

More information

Recent results on Timed Systems

Recent results on Timed Systems Recent results on Timed Systems Time Petri Nets and Timed Automata Béatrice Bérard LAMSADE Université Paris-Dauphine & CNRS berard@lamsade.dauphine.fr Based on joint work with F. Cassez, S. Haddad, D.

More information

The Calculus of Looping Sequences

The Calculus of Looping Sequences The Calculus of Looping Sequences Roberto Barbuti, Giulio Caravagna, Andrea MaggioloSchettini, Paolo Milazzo, Giovanni Pardini Dipartimento di Informatica, Università di Pisa, Italy Bertinoro June 7, 2008

More information

Models of Concurrency

Models of Concurrency Models of Concurrency GERARDO SCHNEIDER UPPSALA UNIVERSITY DEPARTMENT OF INFORMATION TECHNOLOGY UPPSALA, SWEDEN Thanks to Frank Valencia Models of Concurrency p.1/57 Concurrency is Everywhere Concurrent

More information

Probabilistic Program Analysis

Probabilistic Program Analysis Probabilistic Program Analysis Data Flow Analysis and Regression Alessandra Di Pierro University of Verona, Italy alessandra.dipierro@univr.it Herbert Wiklicky Imperial College London, UK herbert@doc.ic.ac.uk

More information

Time-abstracting Bisimulation for Probabilistic Timed Automata

Time-abstracting Bisimulation for Probabilistic Timed Automata Time-abstracting Bisimulation for Probabilistic Timed Automata Taolue Chen CWI PO Box 94079, 1090 GB Amsterdam, The Netherlands chen@cwi.nl Tingting Han Joost-Pieter Katoen MOVES, RWTH Aachen University,

More information

A simple procedure for finding guessing attacks (Extended Abstract)

A simple procedure for finding guessing attacks (Extended Abstract) A simple procedure for finding guessing attacks (Extended Abstract) Ricardo Corin 1 and Sandro Etalle 1,2 1 Dept. of Computer Science, University of Twente, The Netherlands 2 CWI, Center for Mathematics

More information

Opacity Generalised to Transition Systems

Opacity Generalised to Transition Systems School of Computing Science, University of Newcastle upon Tyne Opacity Generalised to Transition Systems Jeremy W. Bryans, Maciej Koutny, Laurent Mazare and Peter Y. A. Ryan Technical Report Series CS-TR-868

More information

A Note on Scope and Infinite Behaviour in CCS-like Calculi p.1/32

A Note on Scope and Infinite Behaviour in CCS-like Calculi p.1/32 A Note on Scope and Infinite Behaviour in CCS-like Calculi GERARDO SCHNEIDER UPPSALA UNIVERSITY DEPARTMENT OF INFORMATION TECHNOLOGY UPPSALA, SWEDEN Joint work with Pablo Giambiagi and Frank Valencia A

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

Fundamenta Informaticae 94 (2009) DOI /FI IOS Press. Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo Milazzo

Fundamenta Informaticae 94 (2009) DOI /FI IOS Press. Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo Milazzo Fundamenta Informaticae 94 (2009) 1 19 1 DOI 10.3233/FI-2009-115 IOS Press Timed P Automata Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo Milazzo Dipartimento di Informatica, Università di Pisa Largo

More information

Partial model checking via abstract interpretation

Partial model checking via abstract interpretation Partial model checking via abstract interpretation N. De Francesco, G. Lettieri, L. Martini, G. Vaglini Università di Pisa, Dipartimento di Ingegneria dell Informazione, sez. Informatica, Via Diotisalvi

More information

DERIVING AND PROVING ABSTRACT NON-INTERFERENCE

DERIVING AND PROVING ABSTRACT NON-INTERFERENCE DERIVING AND PROVING ABSTRACT NON-INTERFERENCE Roberto Giacobazzi and Isabella Mastroeni Dipartimento di Informatica Università di Verona Italy Paris, February 20th, 2004 Deriving and Proving Abstract

More information

Trace Refinement of π-calculus Processes

Trace Refinement of π-calculus Processes Trace Refinement of pi-calculus Processes Trace Refinement of π-calculus Processes Manuel Gieseking manuel.gieseking@informatik.uni-oldenburg.de) Correct System Design, Carl von Ossietzky University of

More information

A note on coinduction and weak bisimilarity for while programs

A note on coinduction and weak bisimilarity for while programs Centrum voor Wiskunde en Informatica A note on coinduction and weak bisimilarity for while programs J.J.M.M. Rutten Software Engineering (SEN) SEN-R9826 October 31, 1998 Report SEN-R9826 ISSN 1386-369X

More information

Bisimulation Congruences in the Calculus of Looping Sequences

Bisimulation Congruences in the Calculus of Looping Sequences Bisimulation ongruences in the alculus of Looping Sequences Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo Milazzo, and Angelo Troina Dipartimento di Informatica, Università di Pisa Largo B. Pontecorvo

More information

Probabilistic Action System Trace Semantics

Probabilistic Action System Trace Semantics Probabilistic Action System Trace Semantics Larissa Meinicke April 007 Technical Report SSE-007-0 Division of Systems and Software Engineering Research School of Information Technology and Electrical Engineering

More information

A Type System for Required/Excluded Elements in CLS

A Type System for Required/Excluded Elements in CLS A Type System for Required/Excluded Elements in CLS Mariangiola Dezani-Ciancaglini Dipartimento di Informatica, Università di Torino dezani@di.unito.it Paola Giannini Dipartimento di Informatica, Università

More information

Timed Automata. Chapter Clocks and clock constraints Clock variables and clock constraints

Timed Automata. Chapter Clocks and clock constraints Clock variables and clock constraints Chapter 10 Timed Automata In the previous chapter, we have discussed a temporal logic where time was a discrete entities. A time unit was one application of the transition relation of an LTS. We could

More information

Using Architecture to Reason about Information Security

Using Architecture to Reason about Information Security Using Architecture to Reason about Information Security Ron van der Meyden (University of New South Wales Sydney, Australia) Joint work with Stephen Chong (Harvard) December 3, 2012 Overview Motivation:

More information

Spatial P systems. 1. Dipartimento di Informatica, Università di Pisa, Italy 2. School of Science and Technology, Università di Camerino, Italy

Spatial P systems. 1. Dipartimento di Informatica, Università di Pisa, Italy 2. School of Science and Technology, Università di Camerino, Italy Spatial P Systems Roberto Barbuti 1 Andrea Maggiolo-Schettini 1 Paolo Milazzo 1 Giovanni Pardini 1 Luca Tesei 2 1. Dipartimento di Informatica, Università di Pisa, Italy 2. School of Science and Technology,

More information

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Stavros Tripakis Abstract We introduce problems of decentralized control with communication, where we explicitly

More information

Analysis and Optimization of Discrete Event Systems using Petri Nets

Analysis and Optimization of Discrete Event Systems using Petri Nets Volume 113 No. 11 2017, 1 10 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Analysis and Optimization of Discrete Event Systems using Petri Nets

More information

Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption

Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption Our Model Checking of Security Protocols without Perfect Cryptography Assumption Czestochowa University of Technology Cardinal Stefan Wyszynski University CN2016 Our 1 2 3 Our 4 5 6 7 Importance of Security

More information

An Independence Relation for Sets of Secrets

An Independence Relation for Sets of Secrets Sara Miner More Pavel Naumov An Independence Relation for Sets of Secrets Abstract. A relation between two secrets, known in the literature as nondeducibility, was originally introduced by Sutherland.

More information

Intransitive Non-Interference for Cryptographic Purposes

Intransitive Non-Interference for Cryptographic Purposes Intransitive Non-Interference for Cryptographic Purposes Michael Backes IBM Zurich Research Laboratory Rüschlikon, Switzerland mbc@zurich.ibm.com Birgit Pfitzmann IBM Zurich Research Laboratory Rüschlikon,

More information

Compositional Abstractions for Interacting Processes

Compositional Abstractions for Interacting Processes Proceedings of the International Multiconference on Computer Science and Information Technology pp. 745 754 ISSN 1896-7094 c 2007 PIPS Compositional Abstractions for Interacting Processes Maciej Koutny

More information

Weighted automata coalgebraically

Weighted automata coalgebraically Weighted automata coalgebraically Filippo Bonchi 4 Michele Boreale 5 Marcello Bonsangue,2 Jan Rutten,3 Alexandra Silva Centrum Wiskunde en Informatica 2 LIACS - Leiden University 3 Radboud Universiteit

More information

MeCBIC Timed P Automata. a Dipartimento di Informatica - University of Pisa Largo Bruno Pontecorvo 3, Pisa - Italy

MeCBIC Timed P Automata. a Dipartimento di Informatica - University of Pisa Largo Bruno Pontecorvo 3, Pisa - Italy MeCBIC 2008 Timed P Automata Roberto Barbuti a,1 Andrea Maggiolo-Schettini a,1 Paolo Milazzo a,1 Luca Tesei b,2 a Dipartimento di Informatica - University of Pisa Largo Bruno Pontecorvo 3, 56127 Pisa -

More information

An Alternative to Gillespie s Algorithm for Simulating Chemical Reactions

An Alternative to Gillespie s Algorithm for Simulating Chemical Reactions An Alternative to Gillespie s Algorithm for Simulating Chemical Reactions Roberto Barbuti, Andrea Maggiolo Schettini, Paolo Milazzo, and Angelo Troina Dipartimento di Informatica, Università di Pisa Largo

More information

A Compositional Approach to Bisimulation of Arenas of Finite State Machines

A Compositional Approach to Bisimulation of Arenas of Finite State Machines A Compositional Approach to Bisimulation of Arenas of Finite State Machines Giordano Pola, Maria D. Di Benedetto and Elena De Santis Department of Electrical and Information Engineering, Center of Excellence

More information

Bounded Stacks, Bags and Queues

Bounded Stacks, Bags and Queues Bounded Stacks, Bags and Queues J.C.M. Baeten 1 and J.A. Bergstra 2,3 1 Department of Mathematics and Computing Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB Eindhoven, The Netherlands,

More information

Iit Istituto di Informatica e Telematica

Iit Istituto di Informatica e Telematica C Consiglio Nazionale delle Ricerche Quantitative evaluation of enforcement strategies V. Ciancia, F. Martinelli, I. Matteucci, C. Morisset IIT TR-04/2013 Technical report Marzo 2013 Iit Istituto di Informatica

More information

An undecidability result for AGh

An undecidability result for AGh Theoretical Computer Science 368 (2006) 161 167 Note An undecidability result for AGh Stéphanie Delaune www.elsevier.com/locate/tcs France Télécom R&D, Lab. Spécification & Vérification, CNRS & ENS de

More information

Towards Co-Engineering Communicating Autonomous Cyber-physical Systems. Bujorianu, M.C. and Bujorianu, M.L. MIMS EPrint:

Towards Co-Engineering Communicating Autonomous Cyber-physical Systems. Bujorianu, M.C. and Bujorianu, M.L. MIMS EPrint: Towards Co-Engineering Communicating Autonomous Cyber-physical Systems Bujorianu M.C. and Bujorianu M.L. 009 MIMS EPrint: 00.53 Manchester Institute for Mathematical Sciences School of Mathematics The

More information

Matching Trace Patterns With Regular Policies

Matching Trace Patterns With Regular Policies Matching Trace Patterns With Regular Policies Franz Baader 1, Andreas Bauer 2, and Alwen Tiu 2 1 TU Dresden, Germany, baader@inf.tu-dresden.de 2 The Australian National University, {baueran, alwen.tiu}@rsise.anu.edu.au

More information

Monitoring and Fault-Diagnosis with Digital Clocks

Monitoring and Fault-Diagnosis with Digital Clocks Author manuscript, published in "6th Int. Conf. on Application of Concurrency to System Design (ACSD'06) (2006)" Monitoring and Fault-Diagnosis with Digital Clocks Karine Altisen Verimag Laboratory Karine.Altisen@imag.fr

More information

{},{a},{a,c} {},{c} {c,d}

{},{a},{a,c} {},{c} {c,d} Modular verication of Argos Programs Agathe Merceron 1 and G. Michele Pinna 2 1 Basser Department of Computer Science, University of Sydney Madsen Building F09, NSW 2006, Australia agathe@staff.cs.su.oz.au

More information

On Expressiveness and Behavioural Theory of Attribute-based Communication

On Expressiveness and Behavioural Theory of Attribute-based Communication On Expressiveness and Behavioural Theory of Attribute-based Communication Rocco De Nicola Joint work with Y. A. Alrahman and M. Loreti Final Meeting CINA Civitanova Marche January 2016 Contents 1 Introduction

More information

Verification and Control of Partially Observable Probabilistic Systems

Verification and Control of Partially Observable Probabilistic Systems Verification and Control of Partially Observable Probabilistic Systems Gethin Norman 1, David Parker 2, and Xueyi Zou 3 1 School of Computing Science, University of Glasgow, UK 2 School of Computer Science,

More information

Undecidability Results for Timed Automata with Silent Transitions

Undecidability Results for Timed Automata with Silent Transitions Fundamenta Informaticae XXI (2001) 1001 1025 1001 IOS Press Undecidability Results for Timed Automata with Silent Transitions Patricia Bouyer LSV, ENS Cachan, CNRS, France bouyer@lsv.ens-cachan.fr Serge

More information

Trace-based Process Algebras for Real-Time Probabilistic Systems

Trace-based Process Algebras for Real-Time Probabilistic Systems Trace-based Process Algebras for Real-Time Probabilistic Systems Stefano Cattani A thesis submitted to The University of Birmingham for the degree of Doctor of Philosophy School of Computer Science The

More information

MPRI Course on Concurrency. Lecture 14. Application of probabilistic process calculi to security

MPRI Course on Concurrency. Lecture 14. Application of probabilistic process calculi to security MPRI Course on Concurrency Lecture 14 Application of probabilistic process calculi to security Catuscia Palamidessi LIX, Ecole Polytechnique kostas@lix.polytechnique.fr www.lix.polytechnique.fr/~catuscia

More information

MOST OF the published research on control of discreteevent

MOST OF the published research on control of discreteevent IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 1, JANUARY 1998 3 Discrete-Event Control of Nondeterministic Systems Michael Heymann and Feng Lin, Member, IEEE Abstract Nondeterminism in discrete-event

More information

Hybrid Automata and ɛ-analysis on a Neural Oscillator

Hybrid Automata and ɛ-analysis on a Neural Oscillator Hybrid Automata and ɛ-analysis on a Neural Oscillator A. Casagrande 1 T. Dreossi 2 C. Piazza 2 1 DMG, University of Trieste, Italy 2 DIMI, University of Udine, Italy Intuitively... Motivations: Reachability

More information

A formal framework for real-time information flow analysis

A formal framework for real-time information flow analysis computers & security 28 (2009) 421 432 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose A formal framework for real-time information flow analysis Joon Son*, Jim Alves-Foss

More information

SPN 2003 Preliminary Version. Translating Hybrid Petri Nets into Hybrid. Automata 1. Dipartimento di Informatica. Universita di Torino

SPN 2003 Preliminary Version. Translating Hybrid Petri Nets into Hybrid. Automata 1. Dipartimento di Informatica. Universita di Torino SPN 2003 Preliminary Version Translating Hybrid Petri Nets into Hybrid Automata 1 Marco Gribaudo 2 and Andras Horvath 3 Dipartimento di Informatica Universita di Torino Corso Svizzera 185, 10149 Torino,

More information

A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols

A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols ASIAN 07 A Formal Analysis for Capturing Replay Attacks in Cryptographic s Han Gao 1, Chiara Bodei 2, Pierpaolo Degano 2, Hanne Riis Nielson 1 Informatics and Mathematics Modelling, Technical University

More information

Models for Efficient Timed Verification

Models for Efficient Timed Verification Models for Efficient Timed Verification François Laroussinie LSV / ENS de Cachan CNRS UMR 8643 Monterey Workshop - Composition of embedded systems Model checking System Properties Formalizing step? ϕ Model

More information

Modeling biological systems with delays in Bio-PEPA

Modeling biological systems with delays in Bio-PEPA Modeling biological systems with delays in Bio-PEPA Giulio Caravagna Dipartimento di Informatica, Università di Pisa, argo Pontecorvo 3, 56127 Pisa, Italy. caravagn@di.unipi.it Jane Hillston aboratory

More information

Compositionality in SLD-derivations and their abstractions Marco Comini, Giorgio Levi and Maria Chiara Meo Dipartimento di Informatica, Universita di

Compositionality in SLD-derivations and their abstractions Marco Comini, Giorgio Levi and Maria Chiara Meo Dipartimento di Informatica, Universita di Compositionality in SLD-derivations and their abstractions Marco Comini Giorgio Levi and Maria Chiara Meo Dipartimento di Informatica Universita di Pisa Corso Italia 40 56125 Pisa Italy fcomini levi meog@di.unipi.it

More information

CS 395T. Probabilistic Polynomial-Time Calculus

CS 395T. Probabilistic Polynomial-Time Calculus CS 395T Probabilistic Polynomial-Time Calculus Security as Equivalence Intuition: encryption scheme is secure if ciphertext is indistinguishable from random noise Intuition: protocol is secure if it is

More information

Dynamic Noninterference Analysis Using Context Sensitive Static Analyses. Gurvan Le Guernic July 14, 2007

Dynamic Noninterference Analysis Using Context Sensitive Static Analyses. Gurvan Le Guernic July 14, 2007 Dynamic Noninterference Analysis Using Context Sensitive Static Analyses Gurvan Le Guernic July 14, 2007 1 Abstract This report proposes a dynamic noninterference analysis for sequential programs. This

More information

Electronic Notes in Theoretical Computer Science 18 (1998) URL: 8 pages Towards characterizing bisim

Electronic Notes in Theoretical Computer Science 18 (1998) URL:   8 pages Towards characterizing bisim Electronic Notes in Theoretical Computer Science 18 (1998) URL: http://www.elsevier.nl/locate/entcs/volume18.html 8 pages Towards characterizing bisimilarity of value-passing processes with context-free

More information

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland. A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,

More information

Hyperproperties. Department of Computer Science Cornell University

Hyperproperties. Department of Computer Science Cornell University Hyperproperties Michael R. Clarkson Fred B. Schneider {clarkson,fbs}@cs.cornell.edu Department of Computer Science Cornell University Computing and Information Science Technical Report http://hdl.handle.net/1813/9480

More information

A comparison of semantic models for intransitive noninterference

A comparison of semantic models for intransitive noninterference A comparison of semantic models for intransitive noninterference Ron van der Meyden School of Computer Science and Engineering, University of New South Wales meyden@cse.unsw.edu.au Abstract. Noninterference

More information

Sanjit A. Seshia EECS, UC Berkeley

Sanjit A. Seshia EECS, UC Berkeley EECS 219C: Computer-Aided Verification Explicit-State Model Checking: Additional Material Sanjit A. Seshia EECS, UC Berkeley Acknowledgments: G. Holzmann Checking if M satisfies : Steps 1. Compute Buchi

More information

Deducing Interactions in Partially Unspecified Biological Systems

Deducing Interactions in Partially Unspecified Biological Systems Deducing Interactions in Partially Unspecified Biological Systems P. Baldan 1 A. Bracciali 2 L. Brodo 3 R. Bruni 2 1 Università di Padova 2 Università di Pisa 3 Università di Sassari Algebraic Biology

More information

Specifying and Verifying Systems of Communicating Agents in a Temporal Action Logic

Specifying and Verifying Systems of Communicating Agents in a Temporal Action Logic Specifying and Verifying Systems of Communicating Agents in a Temporal Action Logic Laura Giordano 1, Alberto Martelli 2, Camilla Schwind 3 1 Dipartimento di Informatica, Università del Piemonte Orientale,

More information

for System Modeling, Analysis, and Optimization

for System Modeling, Analysis, and Optimization Fundamental Algorithms for System Modeling, Analysis, and Optimization Stavros Tripakis UC Berkeley EECS 144/244 Fall 2013 Copyright 2013, E. A. Lee, J. Roydhowdhury, S. A. Seshia, S. Tripakis All rights

More information

COVERT CHANNEL CAPACITY

COVERT CHANNEL CAPACITY COVERT CHANNEL CAPACITY Jonathan K. Millen The MITRE Corporation Bedford, MA 01730 Techniques for detecting covert channels are based on information flow models. This paper establishes a connection between

More information

On closures of lexicographic star-free languages. E. Ochmański and K. Stawikowska

On closures of lexicographic star-free languages. E. Ochmański and K. Stawikowska On closures of lexicographic star-free languages E. Ochmański and K. Stawikowska Preprint No 7/2005 Version 1, posted on April 19, 2005 On closures of lexicographic star-free languages Edward Ochma ski

More information

A comment on Boucherie product-form results

A comment on Boucherie product-form results A comment on Boucherie product-form results Andrea Marin Dipartimento di Informatica Università Ca Foscari di Venezia Via Torino 155, 30172 Venezia Mestre, Italy {balsamo,marin}@dsi.unive.it Abstract.

More information

Time and Timed Petri Nets

Time and Timed Petri Nets Time and Timed Petri Nets Serge Haddad LSV ENS Cachan & CNRS & INRIA haddad@lsv.ens-cachan.fr DISC 11, June 9th 2011 1 Time and Petri Nets 2 Timed Models 3 Expressiveness 4 Analysis 1/36 Outline 1 Time

More information

Measuring Anonymity with Relative Entropy

Measuring Anonymity with Relative Entropy Measuring Anonymity with Relative Entropy Yuxin Deng 1, Jun Pang 2, Peng Wu 3 1 The University of New South Wales School of Computer Science and Engineering, 2052 Sydney, Australia yuxind@cse.unsw.edu.au

More information

A Probabilistic Model for Molecular Systems

A Probabilistic Model for Molecular Systems Fundamenta Informaticae XX (2005) 1 14 1 IOS Press A Probabilistic Model for Molecular Systems Roberto Barbuti Stefano Cataudella Andrea Maggiolo Schettini Paolo Milazzo C Angelo Troina Dipartimento di

More information

Deciding the Security of Protocols with Commuting Public Key Encryption

Deciding the Security of Protocols with Commuting Public Key Encryption Electronic Notes in Theoretical Computer Science 125 (2005) 55 66 www.elsevier.com/locate/entcs Deciding the Security of Protocols with Commuting Public Key Encryption Yannick Chevalier a,1 Ralf Küsters

More information

A Formalism for the Description of Protein Interaction Dedicated to Jerzy Tiuryn on the Occasion of His Sixty Birthday

A Formalism for the Description of Protein Interaction Dedicated to Jerzy Tiuryn on the Occasion of His Sixty Birthday Fundamenta Informaticae XX 2010) 1 29 1 IOS Press A Formalism for the Description of Protein Interaction Dedicated to Jerzy Tiuryn on the Occasion of His Sixty Birthday Roberto Barbuti, Dipartimento di

More information

Semantic Analysis of Gossip Protocols for Wireless Sensor Networks

Semantic Analysis of Gossip Protocols for Wireless Sensor Networks Semantic Analysis of Gossip Protocols for Wireless Sensor Networks Ruggero Lanotte 1 and Massimo Merro 2 1 Dipartimento di Informatica e Comunicazione, Università dell Insubria, Italy 2 Dipartimento di

More information

The Expressivity of Universal Timed CCP: Undecidability of Monadic FLTL and Closure Operators for Security

The Expressivity of Universal Timed CCP: Undecidability of Monadic FLTL and Closure Operators for Security The Expressivity of Universal Timed CCP: Undecidability of Monadic FLTL and Closure Operators for Security Carlos Olarte and Frank D. Valencia INRIA /CNRS and LIX, Ecole Polytechnique Motivation Concurrent

More information

DISTINGUING NON-DETERMINISTIC TIMED FINITE STATE MACHINES

DISTINGUING NON-DETERMINISTIC TIMED FINITE STATE MACHINES DISTINGUING NON-DETERMINISTIC TIMED FINITE STATE MACHINES Maxim Gromov 1, Khaled El-Fakih 2, Natalia Shabaldina 1, Nina Yevtushenko 1 1 Tomsk State University, 36 Lenin Str.. Tomsk, 634050, Russia gromov@sibmail.com,

More information

Duality in Probabilistic Automata

Duality in Probabilistic Automata Duality in Probabilistic Automata Chris Hundt Prakash Panangaden Joelle Pineau Doina Precup Gavin Seal McGill University MFPS May 2006 Genoa p.1/40 Overview We have discovered an - apparently - new kind

More information

PROCESS ALGEBRAIC APPROACH TO HYBRID SYSTEMS. Ed Brinksma Tomas Krilavičius,1 Yaroslav S. Usenko

PROCESS ALGEBRAIC APPROACH TO HYBRID SYSTEMS. Ed Brinksma Tomas Krilavičius,1 Yaroslav S. Usenko PROCESS ALGEBRAIC APPROACH TO HYBRID SYSTEMS Ed Brinksma Tomas Krilavičius,1 Yaroslav S Usenko FMT, EEMCS, University of Twente, POBox 217, 7500 AE Enschede, The Netherlands, {brinksma,tkrilavicius,usenko}

More information

Secure Multiplication of Shared Secrets In The Exponent

Secure Multiplication of Shared Secrets In The Exponent Secure Multiplication of Shared Secrets In The Exponent Rosario Gennaro Mario Di Raimondo May 26, 2003 Abstract We present a new protocol for the following task. Given tow secrets a, b shared among n players,

More information

Universität Augsburg

Universität Augsburg Universität Augsburg Properties of Overwriting for Updates in Typed Kleene Algebras Thorsten Ehm Report 2000-7 Dezember 2000 Institut für Informatik D-86135 Augsburg Copyright c Thorsten Ehm Institut für

More information

University of Groningen. Bisimulation Theory for Switching Linear Systems Pola, Giordano; van der Schaft, Abraham; Benedetto, Maria D.

University of Groningen. Bisimulation Theory for Switching Linear Systems Pola, Giordano; van der Schaft, Abraham; Benedetto, Maria D. University of Groningen Bisimulation Theory for Switching Linear Systems Pola Giordano; van der Schaft Abraham; Benedetto Maria D Di Published in: Proceedings of the 43rd IEEE Conference on Decision and

More information

On Prediction and Planning in Partially Observable Markov Decision Processes with Large Observation Sets

On Prediction and Planning in Partially Observable Markov Decision Processes with Large Observation Sets On Prediction and Planning in Partially Observable Markov Decision Processes with Large Observation Sets Pablo Samuel Castro pcastr@cs.mcgill.ca McGill University Joint work with: Doina Precup and Prakash

More information

Monotonic Abstraction in Parameterized Verification

Monotonic Abstraction in Parameterized Verification Monotonic Abstraction in Parameterized Verification Parosh Aziz Abdulla 1 Department of Information Technology Uppsala University Sweden Giorgio Delzanno 2 Dipartimento Informatica e Scienze dell Informazione

More information