Angelo Troina. Joint work with: Ruggero Lanotte (University of Insubria at Como) Andrea Maggiolo Schettini (University of Pisa)
|
|
- Sharleen Simpson
- 5 years ago
- Views:
Transcription
1 Angelo Troina Dipartimento di Informatica, Università di Pisa, Italy Probabilistic Joint work with: Ruggero Lanotte (University of Insubria at Como) Andrea Maggiolo Schettini (University of Pisa) 1/23
2 Outline Multilevel Security Non-Interference [Goguen and Meseguer,1982] The Model Probabilistic Timed Automata Weak Bisimulation for Probabilistic Timed Automata Probabilistic and/or Timed Security Properties Probabilistic 2/23
3 Security in Multilevel General setting: a multilevel system, i.e. a system of interacting agents where every agent is confined in a bounded security level. Access rules: can be imposed to control direct unwanted transmissions from higher levels to lower levels. Covert channels: information could be transmitted from higher levels to lower levels by using system side effects. Aim: to control the whole flow of information : low level agents are not able to deduce anything about the activity of high level agents. Probabilistic 3/23
4 systems J. A. Goguen, J. Meseguer: Security Policy and Security Models. Proc. of Symp. on Research in Security and Privacy, IEEE CS Press, 11 20, D. McCullough: Noninterference and the Composability of Security Properties. Proc. of Symp. on Research in Security and Privacy, IEEE CS Press, , R. Focardi, R. Gorrieri: A Classification of Security Properties. Journal of Computer Security 3, 5 33, Probabilistic 4/23
5 Timed systems R. Focardi, R. Gorrieri, F. Martinelli: in a Discrete-Time Process Algebra. Proc. of 13th CSFW, IEEE CS Press, , N. Evans, S. Schneider: Analysing Time Dependent Security Properties in CSP Using PVS. Proc. of Symp. on Research in Computer Security, Springer LNCS 1895, , R. Barbuti, L. Tesei: A Decidable Notion of Timed. Fundamenta Informaticae 54, , Probabilistic 5/23
6 Probabilistic systems J. W. Gray III. Toward a Mathematical Foundation for Security. Journal of Computer Security 1, , A. Aldini, M. Bravetti, R. Gorrieri: A Process-algebraic Approach for the of Probabilistic. Journal of Computer Security 12, , A. Di Pierro, C. Hankin, H. Wiklicky: Approximate Non-Interference. Journal of Computer Security 12, 37-82, Probabilistic 6/23
7 A Probabilistic Timed Automaton (PTA) is A = (Σ, X, Q, q 0, δ, π). q0 a, 1 2 b, 1 2 x = 5 x = 5 q1 q2 Probabilistic A configuration of a PTA is a pair s = (q, v), where q Q is a state, and v is a valuation over X. 7/23
8 Weak Bisimulation of Probabilistic Timed Automata A weak bisimulation is a bisimulation which does not take care of internal moves. For a PTA A = (Σ, X, Q, q 0, δ, π) a weak bisimulation is an equivalence relation R such that, for all (s, s ) R and equivalence classes C of R: Probabilistic Prob(s, τ α, C) = Prob(s, τ α, C) α Σ {τ} IR >0 Two configurations s, s are weak bisimilar (s s ) iff (s, s ) R for some weak bisimulation R. 8/23
9 Weak Bisimulation of Probabilistic Timed Automata (2) τ, 1 3 q0 r0 a, 1 2 b, 1 2 a, 1 3 b, 1 3 x = 5 x = 5 z = 5 z = 5 q1 q2 r1 r2 A 1 A 2 Probabilistic Figure: A 1 A 2. 9/23
10 Auxiliary operators for Probabilistic Timed Automata Given two PTA A 1 and A 2, L Σ set of synchronization actions and p ]0, 1[ advancing speed parameter, A 1 p L A 2 denotes the parallel composition. The composition is a PTA obtained by normalizing probabilities and hiding with the τ label the synchronized actions. The restriction of a PTA A with respect to the set of actions L is A \ L, obtained from A by removing transitions and normalization of probabilities. Probabilistic The hiding of a PTA A with respect to the set of actions L is A/L where each transition label a L is replaced by label τ. 10/23
11 A system S satisfies the property (S NI ) if high level agents do not interfere with the observable behavior of the system from the low level point of view: S NI S/Σ H S \ Σ H where Σ H is the set of high level actions. (The observable behavior of the isolated system is bisimilar to the behavior of the system which communicates with high level agents in an invisible manner for the low agent point of view). Probabilistic Proposition. It is decidable to check whether a system S satisfies the NI property. 11/23
12 An example of non-deterministic covert channel. q 0 l q 2 h q 1 l q 3 q 0 l q 2 q 0 l q 2 τ A A \ Σ H A/Σ H q 1 l q 3 Probabilistic The high level action h interferes with the observation of the action l. In A \ Σ H the low level agent observes only the execution of l, whereas, in A/Σ H also action l may be observed. A low level agent, observing the event l knows that action h has occurred. 12/23
13 Timed An example of timing covert channel. h τ q 0 q 1 q 0 q 0 q 1 l x = 0 l x = 5 l x = 0 l x = 0 l x = 5 q 2 q 3 q 2 q 2 q 3 A A \ Σ H A/Σ H Probabilistic The high level action h interferes with the time of observing the action l. In A \ Σ H the low level agent observes l executed immediately, whereas, in A/Σ H l could either be observed immediately or when the clock x reaches value 5. A low level agent, observing the event l when clock x has value 5 knows that action h has occurred. 13/23
14 Probabilistic q 1 q 1 q 1 l, p l, p l, p q 0 l, q q 2 l, r q 3 h q 5 q 0 l, q q 2 l, r q 3 q 0 l, q q 2 l, r q 3 τ q 5 Probabilistic l q 4 l q 6 l q 4 l q 4 l q 6 A A \ Σ H A/Σ H A \ Σ H : l is obsevred with probability p + r, ll with probability q. A/Σ H : l is observed with probability p, ll with probability r + q. 14/23
15 A Classification of Quantitative Security Properties Given NNI, TNI, PNI and PTNI be non-interference properties defined for the models of non-deterministic automata, timed automata, probabilistic automata and probabilistic timed automata, respectively, the following implications hold: A PNI unprob(a) NNI A TNI untime(a) NNI A PTNI unprob(a) TNI untime(a) PNI. Probabilistic 15/23
16 A Classification of Quantitative Security Properties (2) A : A PTNI unprob(a) TNI untime(a) PNI A A \ Σ H A/Σ H l q 1 q l 7 x = 3 τ, 1 x = 3 q 9 3 q h, 0 1 τ, q 3 τ, 1 3 q l 4 q 2 x = 4 q 5 τ, 1 10 q l 6 x = 4 q 8 l q 1 x = 3 q 3 τ, 1 2 q 0 τ, 1 2 q l 4 q 2 x = 4 l q 1 x = 3 q 3 τ, 1 3 q 0 τ, 1 3 q l 4 q 2 x = 4 q l 7 x = 3 q 9 τ, 1 τ, q 5 τ, 1 10 l x = 4 q 8 q 6 Probabilistic A \ Σ H : l when x = 3 or when x = 4 with probability 1 2. A/Σ H : l when x = 3 with probability 19 30, l when x = 4 with probability /23
17 A Classification of Quantitative Security Properties (3) The following diagram summarizes our results. PNI PTNI TNI NNI Probabilistic Figure: Relations among Non-Interference security properties. 17/23
18 A system S satisfies the (NDC) if the system in isolation has not to be altered when considering all the potential interactions with the high level agents of the external environment, formally: S NDC Π Γ H, p ]0, 1[, L Σ H S/Σ H (S p L Π) \ Σ H where Γ H is the set of high level agents. (The observable behavior of the isolated system is bisimilar to the behavior of the system communicating with the high level agent Π in an invisible manner for the low agent point of view). Probabilistic Note. Decidability of NDC depends on the possibility of reducing all the high level automata in Γ H to a finite case for the particular automaton S considered. 18/23
19 (2) Theorem. S mndc S mni. h, q q h 1 q 3 q 0 τ, q q τ 1 q 3 l, 1 2 q 2 l q 4 l q 2 l, 1 2 q 2 A A \ Σ H A/Σ H l q 4 Probabilistic r 0 h r 1 τ, 3 4 r 0 l, 1 4 r 2 r 1 Π (A p L Π) \ Σ H A is PTNI secure, since A/Σ H A \ Σ H. But A is not PTNDC secure as (A p L Π) \ Σ H reaches with probability 3 4 a state where it cannot perform any visible action. 19/23
20 A Classification of Quantitative Security Properties(4) Given NNDC, TNDC, PNDC and PTNDC be non-deducibility on composition properties defined for the models of non-deterministic automata, timed automata, probabilistic automata and probabilistic timed automata, respectively, the following implication holds: A PTNDC (PNDC, TNDC, NNDC) A PTNI (PNI, TNI, NNI). Moreover, as for the NI properties, we have that: A PNDC unprob(a) NNDC; A TNDC untime(a) NNDC; A PTNDC unprob(a) TNDC untime(a) PNDC. and that A : A PTNDC unprob(a) TNDC untime(a) PNDC. Probabilistic 20/23
21 A Classification of Quantitative Security Properties (5) PNI NNDC PNDC TNDC NNI TNI Probabilistic PTNI PTNDC 21/23
22 Observations and Future Work Introduce an approximated notion of weak bisimulation for PTA. We can formulate other well known information flow security properties within our framework. Extend the model with cryptographic primitives in order to analyze security protocols. Develop an automatic technique to adjust unsecure systems. Probabilistic 22/23
23 Bibliography [1] R. Lanotte, A. Maggiolo-Schettini, A Classification of /or Probability Dependent Security Properties Proc. QAPL 05, Elsevier ENTCS, to appear. [2] R. Lanotte, A. Maggiolo-Schettini, for Probabilistic Timed Automata Proc. FAST 04, Springer IFIP series 173, pp , [3] R. Lanotte, A. Maggiolo-Schettini, Weak Bisimulation for Probabilistic Timed Automata and Applications to Security Proc. SEFM 03, IEEE Computer Society Press, pp , Probabilistic 23/23
Reachability Results for Timed Automata with Unbounded Data Structures
Acta Informatica manuscript No. (will be inserted by the editor) Reachability Results for Timed Automata with Unbounded Data Structures Ruggero Lanotte Andrea Maggiolo-Schettini Angelo Troina Received:
More informationExpressing Security Properties Using Selective Interleaving Functions
Expressing Security Properties Using Selective Interleaving Functions Joseph Halpern and Sabina Petride August 8, 2008 Abstract McLean s notion of Selective Interleaving Functions (SIFs) is perhaps the
More informationDesign and Verification of Long Running Transactions in a Timed Framework
Design and Verification of Long Running Transactions in a Timed Framework Ruggero Lanotte a, Andrea Maggiolo Schettini b, Paolo Milazzo b, Angelo Troina c, a Dipartimento di Scienze della Cultura, Politiche
More informationA Framework for. Security Analysis. with Team Automata
A Framework for Security Analysis with Team Automata Marinella Petrocchi Istituto di Informatica e Telematica National Research Council IIT-CNR Pisa, Italy Tuesday 8 June 2004 DIMACS with Maurice ter Beek
More informationFormal Methods and Systems Biology: The Calculus of Looping Sequences
Formal Methods and Systems Biology: The Calculus of Looping Sequences Paolo Milazzo Dipartimento di Informatica, Università di Pisa, Italy Verona January 22, 2008 Paolo Milazzo (Università di Pisa) Formal
More informationDistributed Knowledge and Information Flow Security
Distributed Knowledge and Information Flow Security School of Computer Science and Engineering, University of New South Wales Sydney, Australia meyden@cse.unsw.edu.au http://www.cse.unsw.edu.au/ meyden
More informationTimed Automata VINO 2011
Timed Automata VINO 2011 VeriDis Group - LORIA July 18, 2011 Content 1 Introduction 2 Timed Automata 3 Networks of timed automata Motivation Formalism for modeling and verification of real-time systems.
More informationNon-interference. Christoph Sprenger and Sebastian Mödersheim. FMSEC Module 11, v.2 November 30, Department of Computer Science ETH Zurich
Non-interference Christoph Sprenger and Sebastian Mödersheim Department of Computer Science ETH Zurich FMSEC Module 11, v.2 November 30, 2009 Outline 1 Basic Non-interference Unwinding Access Control Interpretations
More informationProgram Analysis Probably Counts
Probably Counts 1 c.hankin@imperial.ac.uk joint work with Alessandra Di Pierro 2 and Herbert Wiklicky 1 1 Department of Computing, 2 Dipartimento di Informatica, Università di Verona Computer Journal Lecture,
More informationOn Distribution Based Bisimulations for Probabilistic Automata
On Distribution Based Bisimulations for Probabilistic Automata AVACS alumni technical talk Lijun Zhang Institute of Software, Chinese Academy of Sciences Joint work with Holger Hermanns, Lei Song, Christian
More informationIit Istituto di Informatica e Telematica
C Consiglio Nazionale delle Ricerche Specification and Analysis of Information Flow Properties for Distributed Systems R. Gorreri, F. Martinelli, I. Matteucci IIT TR-12/2010 Technical report Febbraio 2010
More informationEAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties
EAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties Bernd Finkbeiner, Christopher Hahn, and Marvin Stenger Saarland Informatics Campus, Saarland University, Saarbrücken, Germany
More informationThe State Explosion Problem
The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis
More informationThe Complexity of Intransitive Noninterference
The Complexity of Intransitive Noninterference Sebastian Eggert, Ron van der Meyden, Henning Schnoor, Thomas Wilke Institut für Informatik, Kiel University School of Computer Science and Engineering, University
More informationTime-Bounding Needham-Schroeder Public Key Exchange Protocol
Time-Bounding Needham-Schroeder Public Key Exchange Protocol Max Kanovich, Queen Mary, University of London, UK University College London, UCL-CS, UK Tajana Ban Kirigin, University of Rijeka, HR Vivek
More informationAbstract Non-Interference - An Abstract Interpretation-based approach to Secure Information Flow
Isabella Mastroeni Abstract Non-Interference - An Abstract Interpretation-based approach to Secure Information Flow Ph.D. Thesis 31 Marzo 2005 Università degli Studi di Verona Dipartimento di Informatica
More informationA Weak Bisimulation for Weighted Automata
Weak Bisimulation for Weighted utomata Peter Kemper College of William and Mary Weighted utomata and Semirings here focus on commutative & idempotent semirings Weak Bisimulation Composition operators Congruence
More informationState Explosion in Almost-Sure Probabilistic Reachability
State Explosion in Almost-Sure Probabilistic Reachability François Laroussinie Lab. Spécification & Vérification, ENS de Cachan & CNRS UMR 8643, 61, av. Pdt. Wilson, 94235 Cachan Cedex France Jeremy Sproston
More informationSecrecy in Multiagent Systems
Secrecy in Multiagent Systems Joseph Y. Halpern & Kevin R. O Neill Department of Computer Science Cornell University halpern@cs.cornell.edu; kroneill@gmail.com We introduce a general framework for reasoning
More informationQuantifying Information Flow
Quantifying Information Flow Gavin owe February 5, 2002 Abstract We extend definitions of information flow so as to quantify the amount of information passed; in other words, we give a formal definition
More informationDecidability Results for Probabilistic Hybrid Automata
Decidability Results for Probabilistic Hybrid Automata Prof. Dr. Erika Ábrahám Informatik 2 - Theory of Hybrid Systems RWTH Aachen SS09 - Probabilistic hybrid automata 1 / 17 Literatur Jeremy Sproston:
More informationQuantitative analysis of secure information flow via Probabilistic Semantics
Quantitative analysis of secure information flow via Probabilistic Semantics Chunyan Mu Department of Computer Science King s College London The Strand, London WCR LS Email: Chunyan.Mu@kcl.ac.uk David
More informationRecent results on Timed Systems
Recent results on Timed Systems Time Petri Nets and Timed Automata Béatrice Bérard LAMSADE Université Paris-Dauphine & CNRS berard@lamsade.dauphine.fr Based on joint work with F. Cassez, S. Haddad, D.
More informationThe Calculus of Looping Sequences
The Calculus of Looping Sequences Roberto Barbuti, Giulio Caravagna, Andrea MaggioloSchettini, Paolo Milazzo, Giovanni Pardini Dipartimento di Informatica, Università di Pisa, Italy Bertinoro June 7, 2008
More informationModels of Concurrency
Models of Concurrency GERARDO SCHNEIDER UPPSALA UNIVERSITY DEPARTMENT OF INFORMATION TECHNOLOGY UPPSALA, SWEDEN Thanks to Frank Valencia Models of Concurrency p.1/57 Concurrency is Everywhere Concurrent
More informationProbabilistic Program Analysis
Probabilistic Program Analysis Data Flow Analysis and Regression Alessandra Di Pierro University of Verona, Italy alessandra.dipierro@univr.it Herbert Wiklicky Imperial College London, UK herbert@doc.ic.ac.uk
More informationTime-abstracting Bisimulation for Probabilistic Timed Automata
Time-abstracting Bisimulation for Probabilistic Timed Automata Taolue Chen CWI PO Box 94079, 1090 GB Amsterdam, The Netherlands chen@cwi.nl Tingting Han Joost-Pieter Katoen MOVES, RWTH Aachen University,
More informationA simple procedure for finding guessing attacks (Extended Abstract)
A simple procedure for finding guessing attacks (Extended Abstract) Ricardo Corin 1 and Sandro Etalle 1,2 1 Dept. of Computer Science, University of Twente, The Netherlands 2 CWI, Center for Mathematics
More informationOpacity Generalised to Transition Systems
School of Computing Science, University of Newcastle upon Tyne Opacity Generalised to Transition Systems Jeremy W. Bryans, Maciej Koutny, Laurent Mazare and Peter Y. A. Ryan Technical Report Series CS-TR-868
More informationA Note on Scope and Infinite Behaviour in CCS-like Calculi p.1/32
A Note on Scope and Infinite Behaviour in CCS-like Calculi GERARDO SCHNEIDER UPPSALA UNIVERSITY DEPARTMENT OF INFORMATION TECHNOLOGY UPPSALA, SWEDEN Joint work with Pablo Giambiagi and Frank Valencia A
More informationPairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events
Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle
More informationFundamenta Informaticae 94 (2009) DOI /FI IOS Press. Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo Milazzo
Fundamenta Informaticae 94 (2009) 1 19 1 DOI 10.3233/FI-2009-115 IOS Press Timed P Automata Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo Milazzo Dipartimento di Informatica, Università di Pisa Largo
More informationPartial model checking via abstract interpretation
Partial model checking via abstract interpretation N. De Francesco, G. Lettieri, L. Martini, G. Vaglini Università di Pisa, Dipartimento di Ingegneria dell Informazione, sez. Informatica, Via Diotisalvi
More informationDERIVING AND PROVING ABSTRACT NON-INTERFERENCE
DERIVING AND PROVING ABSTRACT NON-INTERFERENCE Roberto Giacobazzi and Isabella Mastroeni Dipartimento di Informatica Università di Verona Italy Paris, February 20th, 2004 Deriving and Proving Abstract
More informationTrace Refinement of π-calculus Processes
Trace Refinement of pi-calculus Processes Trace Refinement of π-calculus Processes Manuel Gieseking manuel.gieseking@informatik.uni-oldenburg.de) Correct System Design, Carl von Ossietzky University of
More informationA note on coinduction and weak bisimilarity for while programs
Centrum voor Wiskunde en Informatica A note on coinduction and weak bisimilarity for while programs J.J.M.M. Rutten Software Engineering (SEN) SEN-R9826 October 31, 1998 Report SEN-R9826 ISSN 1386-369X
More informationBisimulation Congruences in the Calculus of Looping Sequences
Bisimulation ongruences in the alculus of Looping Sequences Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo Milazzo, and Angelo Troina Dipartimento di Informatica, Università di Pisa Largo B. Pontecorvo
More informationProbabilistic Action System Trace Semantics
Probabilistic Action System Trace Semantics Larissa Meinicke April 007 Technical Report SSE-007-0 Division of Systems and Software Engineering Research School of Information Technology and Electrical Engineering
More informationA Type System for Required/Excluded Elements in CLS
A Type System for Required/Excluded Elements in CLS Mariangiola Dezani-Ciancaglini Dipartimento di Informatica, Università di Torino dezani@di.unito.it Paola Giannini Dipartimento di Informatica, Università
More informationTimed Automata. Chapter Clocks and clock constraints Clock variables and clock constraints
Chapter 10 Timed Automata In the previous chapter, we have discussed a temporal logic where time was a discrete entities. A time unit was one application of the transition relation of an LTS. We could
More informationUsing Architecture to Reason about Information Security
Using Architecture to Reason about Information Security Ron van der Meyden (University of New South Wales Sydney, Australia) Joint work with Stephen Chong (Harvard) December 3, 2012 Overview Motivation:
More informationSpatial P systems. 1. Dipartimento di Informatica, Università di Pisa, Italy 2. School of Science and Technology, Università di Camerino, Italy
Spatial P Systems Roberto Barbuti 1 Andrea Maggiolo-Schettini 1 Paolo Milazzo 1 Giovanni Pardini 1 Luca Tesei 2 1. Dipartimento di Informatica, Università di Pisa, Italy 2. School of Science and Technology,
More informationDecentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication
Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Stavros Tripakis Abstract We introduce problems of decentralized control with communication, where we explicitly
More informationAnalysis and Optimization of Discrete Event Systems using Petri Nets
Volume 113 No. 11 2017, 1 10 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Analysis and Optimization of Discrete Event Systems using Petri Nets
More informationProbabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption
Our Model Checking of Security Protocols without Perfect Cryptography Assumption Czestochowa University of Technology Cardinal Stefan Wyszynski University CN2016 Our 1 2 3 Our 4 5 6 7 Importance of Security
More informationAn Independence Relation for Sets of Secrets
Sara Miner More Pavel Naumov An Independence Relation for Sets of Secrets Abstract. A relation between two secrets, known in the literature as nondeducibility, was originally introduced by Sutherland.
More informationIntransitive Non-Interference for Cryptographic Purposes
Intransitive Non-Interference for Cryptographic Purposes Michael Backes IBM Zurich Research Laboratory Rüschlikon, Switzerland mbc@zurich.ibm.com Birgit Pfitzmann IBM Zurich Research Laboratory Rüschlikon,
More informationCompositional Abstractions for Interacting Processes
Proceedings of the International Multiconference on Computer Science and Information Technology pp. 745 754 ISSN 1896-7094 c 2007 PIPS Compositional Abstractions for Interacting Processes Maciej Koutny
More informationWeighted automata coalgebraically
Weighted automata coalgebraically Filippo Bonchi 4 Michele Boreale 5 Marcello Bonsangue,2 Jan Rutten,3 Alexandra Silva Centrum Wiskunde en Informatica 2 LIACS - Leiden University 3 Radboud Universiteit
More informationMeCBIC Timed P Automata. a Dipartimento di Informatica - University of Pisa Largo Bruno Pontecorvo 3, Pisa - Italy
MeCBIC 2008 Timed P Automata Roberto Barbuti a,1 Andrea Maggiolo-Schettini a,1 Paolo Milazzo a,1 Luca Tesei b,2 a Dipartimento di Informatica - University of Pisa Largo Bruno Pontecorvo 3, 56127 Pisa -
More informationAn Alternative to Gillespie s Algorithm for Simulating Chemical Reactions
An Alternative to Gillespie s Algorithm for Simulating Chemical Reactions Roberto Barbuti, Andrea Maggiolo Schettini, Paolo Milazzo, and Angelo Troina Dipartimento di Informatica, Università di Pisa Largo
More informationA Compositional Approach to Bisimulation of Arenas of Finite State Machines
A Compositional Approach to Bisimulation of Arenas of Finite State Machines Giordano Pola, Maria D. Di Benedetto and Elena De Santis Department of Electrical and Information Engineering, Center of Excellence
More informationBounded Stacks, Bags and Queues
Bounded Stacks, Bags and Queues J.C.M. Baeten 1 and J.A. Bergstra 2,3 1 Department of Mathematics and Computing Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB Eindhoven, The Netherlands,
More informationIit Istituto di Informatica e Telematica
C Consiglio Nazionale delle Ricerche Quantitative evaluation of enforcement strategies V. Ciancia, F. Martinelli, I. Matteucci, C. Morisset IIT TR-04/2013 Technical report Marzo 2013 Iit Istituto di Informatica
More informationAn undecidability result for AGh
Theoretical Computer Science 368 (2006) 161 167 Note An undecidability result for AGh Stéphanie Delaune www.elsevier.com/locate/tcs France Télécom R&D, Lab. Spécification & Vérification, CNRS & ENS de
More informationTowards Co-Engineering Communicating Autonomous Cyber-physical Systems. Bujorianu, M.C. and Bujorianu, M.L. MIMS EPrint:
Towards Co-Engineering Communicating Autonomous Cyber-physical Systems Bujorianu M.C. and Bujorianu M.L. 009 MIMS EPrint: 00.53 Manchester Institute for Mathematical Sciences School of Mathematics The
More informationMatching Trace Patterns With Regular Policies
Matching Trace Patterns With Regular Policies Franz Baader 1, Andreas Bauer 2, and Alwen Tiu 2 1 TU Dresden, Germany, baader@inf.tu-dresden.de 2 The Australian National University, {baueran, alwen.tiu}@rsise.anu.edu.au
More informationMonitoring and Fault-Diagnosis with Digital Clocks
Author manuscript, published in "6th Int. Conf. on Application of Concurrency to System Design (ACSD'06) (2006)" Monitoring and Fault-Diagnosis with Digital Clocks Karine Altisen Verimag Laboratory Karine.Altisen@imag.fr
More information{},{a},{a,c} {},{c} {c,d}
Modular verication of Argos Programs Agathe Merceron 1 and G. Michele Pinna 2 1 Basser Department of Computer Science, University of Sydney Madsen Building F09, NSW 2006, Australia agathe@staff.cs.su.oz.au
More informationOn Expressiveness and Behavioural Theory of Attribute-based Communication
On Expressiveness and Behavioural Theory of Attribute-based Communication Rocco De Nicola Joint work with Y. A. Alrahman and M. Loreti Final Meeting CINA Civitanova Marche January 2016 Contents 1 Introduction
More informationVerification and Control of Partially Observable Probabilistic Systems
Verification and Control of Partially Observable Probabilistic Systems Gethin Norman 1, David Parker 2, and Xueyi Zou 3 1 School of Computing Science, University of Glasgow, UK 2 School of Computer Science,
More informationUndecidability Results for Timed Automata with Silent Transitions
Fundamenta Informaticae XXI (2001) 1001 1025 1001 IOS Press Undecidability Results for Timed Automata with Silent Transitions Patricia Bouyer LSV, ENS Cachan, CNRS, France bouyer@lsv.ens-cachan.fr Serge
More informationTrace-based Process Algebras for Real-Time Probabilistic Systems
Trace-based Process Algebras for Real-Time Probabilistic Systems Stefano Cattani A thesis submitted to The University of Birmingham for the degree of Doctor of Philosophy School of Computer Science The
More informationMPRI Course on Concurrency. Lecture 14. Application of probabilistic process calculi to security
MPRI Course on Concurrency Lecture 14 Application of probabilistic process calculi to security Catuscia Palamidessi LIX, Ecole Polytechnique kostas@lix.polytechnique.fr www.lix.polytechnique.fr/~catuscia
More informationMOST OF the published research on control of discreteevent
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 1, JANUARY 1998 3 Discrete-Event Control of Nondeterministic Systems Michael Heymann and Feng Lin, Member, IEEE Abstract Nondeterminism in discrete-event
More informationHybrid Automata and ɛ-analysis on a Neural Oscillator
Hybrid Automata and ɛ-analysis on a Neural Oscillator A. Casagrande 1 T. Dreossi 2 C. Piazza 2 1 DMG, University of Trieste, Italy 2 DIMI, University of Udine, Italy Intuitively... Motivations: Reachability
More informationA formal framework for real-time information flow analysis
computers & security 28 (2009) 421 432 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose A formal framework for real-time information flow analysis Joon Son*, Jim Alves-Foss
More informationSPN 2003 Preliminary Version. Translating Hybrid Petri Nets into Hybrid. Automata 1. Dipartimento di Informatica. Universita di Torino
SPN 2003 Preliminary Version Translating Hybrid Petri Nets into Hybrid Automata 1 Marco Gribaudo 2 and Andras Horvath 3 Dipartimento di Informatica Universita di Torino Corso Svizzera 185, 10149 Torino,
More informationA Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
ASIAN 07 A Formal Analysis for Capturing Replay Attacks in Cryptographic s Han Gao 1, Chiara Bodei 2, Pierpaolo Degano 2, Hanne Riis Nielson 1 Informatics and Mathematics Modelling, Technical University
More informationModels for Efficient Timed Verification
Models for Efficient Timed Verification François Laroussinie LSV / ENS de Cachan CNRS UMR 8643 Monterey Workshop - Composition of embedded systems Model checking System Properties Formalizing step? ϕ Model
More informationModeling biological systems with delays in Bio-PEPA
Modeling biological systems with delays in Bio-PEPA Giulio Caravagna Dipartimento di Informatica, Università di Pisa, argo Pontecorvo 3, 56127 Pisa, Italy. caravagn@di.unipi.it Jane Hillston aboratory
More informationCompositionality in SLD-derivations and their abstractions Marco Comini, Giorgio Levi and Maria Chiara Meo Dipartimento di Informatica, Universita di
Compositionality in SLD-derivations and their abstractions Marco Comini Giorgio Levi and Maria Chiara Meo Dipartimento di Informatica Universita di Pisa Corso Italia 40 56125 Pisa Italy fcomini levi meog@di.unipi.it
More informationCS 395T. Probabilistic Polynomial-Time Calculus
CS 395T Probabilistic Polynomial-Time Calculus Security as Equivalence Intuition: encryption scheme is secure if ciphertext is indistinguishable from random noise Intuition: protocol is secure if it is
More informationDynamic Noninterference Analysis Using Context Sensitive Static Analyses. Gurvan Le Guernic July 14, 2007
Dynamic Noninterference Analysis Using Context Sensitive Static Analyses Gurvan Le Guernic July 14, 2007 1 Abstract This report proposes a dynamic noninterference analysis for sequential programs. This
More informationElectronic Notes in Theoretical Computer Science 18 (1998) URL: 8 pages Towards characterizing bisim
Electronic Notes in Theoretical Computer Science 18 (1998) URL: http://www.elsevier.nl/locate/entcs/volume18.html 8 pages Towards characterizing bisimilarity of value-passing processes with context-free
More informationWojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.
A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,
More informationHyperproperties. Department of Computer Science Cornell University
Hyperproperties Michael R. Clarkson Fred B. Schneider {clarkson,fbs}@cs.cornell.edu Department of Computer Science Cornell University Computing and Information Science Technical Report http://hdl.handle.net/1813/9480
More informationA comparison of semantic models for intransitive noninterference
A comparison of semantic models for intransitive noninterference Ron van der Meyden School of Computer Science and Engineering, University of New South Wales meyden@cse.unsw.edu.au Abstract. Noninterference
More informationSanjit A. Seshia EECS, UC Berkeley
EECS 219C: Computer-Aided Verification Explicit-State Model Checking: Additional Material Sanjit A. Seshia EECS, UC Berkeley Acknowledgments: G. Holzmann Checking if M satisfies : Steps 1. Compute Buchi
More informationDeducing Interactions in Partially Unspecified Biological Systems
Deducing Interactions in Partially Unspecified Biological Systems P. Baldan 1 A. Bracciali 2 L. Brodo 3 R. Bruni 2 1 Università di Padova 2 Università di Pisa 3 Università di Sassari Algebraic Biology
More informationSpecifying and Verifying Systems of Communicating Agents in a Temporal Action Logic
Specifying and Verifying Systems of Communicating Agents in a Temporal Action Logic Laura Giordano 1, Alberto Martelli 2, Camilla Schwind 3 1 Dipartimento di Informatica, Università del Piemonte Orientale,
More informationfor System Modeling, Analysis, and Optimization
Fundamental Algorithms for System Modeling, Analysis, and Optimization Stavros Tripakis UC Berkeley EECS 144/244 Fall 2013 Copyright 2013, E. A. Lee, J. Roydhowdhury, S. A. Seshia, S. Tripakis All rights
More informationCOVERT CHANNEL CAPACITY
COVERT CHANNEL CAPACITY Jonathan K. Millen The MITRE Corporation Bedford, MA 01730 Techniques for detecting covert channels are based on information flow models. This paper establishes a connection between
More informationOn closures of lexicographic star-free languages. E. Ochmański and K. Stawikowska
On closures of lexicographic star-free languages E. Ochmański and K. Stawikowska Preprint No 7/2005 Version 1, posted on April 19, 2005 On closures of lexicographic star-free languages Edward Ochma ski
More informationA comment on Boucherie product-form results
A comment on Boucherie product-form results Andrea Marin Dipartimento di Informatica Università Ca Foscari di Venezia Via Torino 155, 30172 Venezia Mestre, Italy {balsamo,marin}@dsi.unive.it Abstract.
More informationTime and Timed Petri Nets
Time and Timed Petri Nets Serge Haddad LSV ENS Cachan & CNRS & INRIA haddad@lsv.ens-cachan.fr DISC 11, June 9th 2011 1 Time and Petri Nets 2 Timed Models 3 Expressiveness 4 Analysis 1/36 Outline 1 Time
More informationMeasuring Anonymity with Relative Entropy
Measuring Anonymity with Relative Entropy Yuxin Deng 1, Jun Pang 2, Peng Wu 3 1 The University of New South Wales School of Computer Science and Engineering, 2052 Sydney, Australia yuxind@cse.unsw.edu.au
More informationA Probabilistic Model for Molecular Systems
Fundamenta Informaticae XX (2005) 1 14 1 IOS Press A Probabilistic Model for Molecular Systems Roberto Barbuti Stefano Cataudella Andrea Maggiolo Schettini Paolo Milazzo C Angelo Troina Dipartimento di
More informationDeciding the Security of Protocols with Commuting Public Key Encryption
Electronic Notes in Theoretical Computer Science 125 (2005) 55 66 www.elsevier.com/locate/entcs Deciding the Security of Protocols with Commuting Public Key Encryption Yannick Chevalier a,1 Ralf Küsters
More informationA Formalism for the Description of Protein Interaction Dedicated to Jerzy Tiuryn on the Occasion of His Sixty Birthday
Fundamenta Informaticae XX 2010) 1 29 1 IOS Press A Formalism for the Description of Protein Interaction Dedicated to Jerzy Tiuryn on the Occasion of His Sixty Birthday Roberto Barbuti, Dipartimento di
More informationSemantic Analysis of Gossip Protocols for Wireless Sensor Networks
Semantic Analysis of Gossip Protocols for Wireless Sensor Networks Ruggero Lanotte 1 and Massimo Merro 2 1 Dipartimento di Informatica e Comunicazione, Università dell Insubria, Italy 2 Dipartimento di
More informationThe Expressivity of Universal Timed CCP: Undecidability of Monadic FLTL and Closure Operators for Security
The Expressivity of Universal Timed CCP: Undecidability of Monadic FLTL and Closure Operators for Security Carlos Olarte and Frank D. Valencia INRIA /CNRS and LIX, Ecole Polytechnique Motivation Concurrent
More informationDISTINGUING NON-DETERMINISTIC TIMED FINITE STATE MACHINES
DISTINGUING NON-DETERMINISTIC TIMED FINITE STATE MACHINES Maxim Gromov 1, Khaled El-Fakih 2, Natalia Shabaldina 1, Nina Yevtushenko 1 1 Tomsk State University, 36 Lenin Str.. Tomsk, 634050, Russia gromov@sibmail.com,
More informationDuality in Probabilistic Automata
Duality in Probabilistic Automata Chris Hundt Prakash Panangaden Joelle Pineau Doina Precup Gavin Seal McGill University MFPS May 2006 Genoa p.1/40 Overview We have discovered an - apparently - new kind
More informationPROCESS ALGEBRAIC APPROACH TO HYBRID SYSTEMS. Ed Brinksma Tomas Krilavičius,1 Yaroslav S. Usenko
PROCESS ALGEBRAIC APPROACH TO HYBRID SYSTEMS Ed Brinksma Tomas Krilavičius,1 Yaroslav S Usenko FMT, EEMCS, University of Twente, POBox 217, 7500 AE Enschede, The Netherlands, {brinksma,tkrilavicius,usenko}
More informationSecure Multiplication of Shared Secrets In The Exponent
Secure Multiplication of Shared Secrets In The Exponent Rosario Gennaro Mario Di Raimondo May 26, 2003 Abstract We present a new protocol for the following task. Given tow secrets a, b shared among n players,
More informationUniversität Augsburg
Universität Augsburg Properties of Overwriting for Updates in Typed Kleene Algebras Thorsten Ehm Report 2000-7 Dezember 2000 Institut für Informatik D-86135 Augsburg Copyright c Thorsten Ehm Institut für
More informationUniversity of Groningen. Bisimulation Theory for Switching Linear Systems Pola, Giordano; van der Schaft, Abraham; Benedetto, Maria D.
University of Groningen Bisimulation Theory for Switching Linear Systems Pola Giordano; van der Schaft Abraham; Benedetto Maria D Di Published in: Proceedings of the 43rd IEEE Conference on Decision and
More informationOn Prediction and Planning in Partially Observable Markov Decision Processes with Large Observation Sets
On Prediction and Planning in Partially Observable Markov Decision Processes with Large Observation Sets Pablo Samuel Castro pcastr@cs.mcgill.ca McGill University Joint work with: Doina Precup and Prakash
More informationMonotonic Abstraction in Parameterized Verification
Monotonic Abstraction in Parameterized Verification Parosh Aziz Abdulla 1 Department of Information Technology Uppsala University Sweden Giorgio Delzanno 2 Dipartimento Informatica e Scienze dell Informazione
More information