Specification and optimal reactive synthesis of run-time enforcement shields

被引:1
|
作者
Pandya, Paritosh K. [1 ,2 ]
Wakankar, Amol [3 ,4 ]
机构
[1] Indian Inst Technol, Mumbai 400076, India
[2] Tata Inst Fundamental Res, Mumbai 400005, India
[3] Homi Bhabha Natl Inst, Mumbai 400094, India
[4] Bhabha Atom Res Ctr, Mumbai 400085, India
关键词
Error correcting shield; Shield synthesis; Logical shield specification; Quantified Discrete Duration Calculus; QDDC; Interval temporal logic; H-optimal shield synthesis; Optimal controller synthesis; Deviation minimization; Shield performance comparison;
D O I
10.1016/j.ic.2022.104865
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A run time enforcement shield is a controller which corrects the output O of a system with sporadic errors (SSE) so as to guarantee the invariance of a critical requirement. Moreover, the shield output O' must deviate from the SSE output O "as little as possible" to maintain the quality. We give a method for logical specification of shields using logic QDDC. The specification consists of a correctness requirement REQ, a mandatory hard deviation constraint HDC, and a soft deviation constraint SDC whose satisfaction must be optimized in an Hoptimal fashion. We show how a tool DCSynth implementing soft requirement guided synthesis is used for the automatic synthesis of shields from such specifications. Next, we give logical formulation of various notions of shields including Bloem's k-Stabilizing shield, Wu's Burst-error shield, as well as new EK-shield and Windowed-EK-shield. We experimentally compare the performance of the shields synthesized under these notions. (c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Specification and Optimal Reactive Synthesis of Run-time Enforcement Shields
    Pandya, Paritosh K.
    Wakankar, Amol
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2019, (305): : 91 - 106
  • [2] On run-time enforcement of policies
    Shah, Harshit
    Shyamasundar, R. K.
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 268 - +
  • [3] Run-Time Enforcement of Nonsafety Policies
    Ligatti, Jay
    Bauer, Lujo
    Walker, David
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
  • [4] Contract representation for run-time monitoring and enforcement
    Molina-Jimenez, C
    Shrivastava, S
    Solaiman, E
    Warne, J
    [J]. IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 103 - 110
  • [5] Gate automata-driven run-time enforcement
    Costa, Gabriele
    Matteucci, Ilaria
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) : 518 - 524
  • [6] Practical Run-Time Norm Enforcement with Bounded Lookahead
    Alechina, Natasha
    Bulling, Nils
    Dastani, Mehdi
    Logan, Brian
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 443 - 451
  • [7] Run-time Requirement Enforcement for Loop Programs on Processor Arrays
    Witterauf, Michael
    Teich, Juergen
    [J]. PROCEEDINGS OF THE 2018 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), 2018, : 22 - 32
  • [8] Edit automata: Enforcement mechanisms for run-time security policies
    Ligatti J.
    Bauer L.
    Walker D.
    [J]. International Journal of Information Security, 2005, 4 (1-2) : 2 - 16
  • [9] Enterprise Dynamic Systems Control Enforcement of Run-Time Business Transactions
    Guerreiro, Sergio
    Vasconcelos, Andre
    Tribolet, Jose
    [J]. ADVANCES IN ENTERPRISE ENGINEERING VI, 2012, 110 : 46 - 60
  • [10] Component-based approach to run-time kernel specification and verification
    Naeser, G
    Lundqvist, K
    [J]. 17TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS, PROCEEDINGS, 2005, : 68 - 76