Secure Information Release in Timed Automata

被引:9
|
作者
Vasilikos, Panagiotis [1 ]
Nielson, Flemming [1 ]
Nielson, Hanne Riis [1 ]
机构
[1] Tech Univ Denmark, Dept Appl Math & Comp Sci, Lyngby, Denmark
来源
PRINCIPLES OF SECURITY AND TRUST, POST 2018 | 2018年 / 10804卷
关键词
NONINTERFERENCE; FLOW; DECLASSIFICATION; NOTION;
D O I
10.1007/978-3-319-89722-6_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the key demands of cyberphysical systems is that they meet their safety goals. Timed automata has established itself as a formalism for modeling and analyzing the real-time safety aspects of cyberphysical systems. Increasingly it is also demanded that cyberphysical systems meet a number of security goals for confidentiality and integrity. Notions of security based on Information flow control, such as non-interference, provide strong guarantees that no information is leaked; however, many cyberphysical systems leak intentionally some information in order to achieve their purposes. In this paper, we develop a formal approach of information flow for timed automata that allows intentional information leaks. The security of a timed automaton is then defined using a bisimulation relation that takes account of the non-determinism and the clocks of timed automata. Finally, we define an algorithm that traverses a timed automaton and imposes information flow constraints on it and we prove that our algorithm is sound with respect to our security notion.
引用
收藏
页码:28 / 52
页数:25
相关论文
共 50 条
  • [1] Information Flow for Timed Automata
    Nielson, Flemming
    Nielson, Hanne Riis
    Vasilikos, Panagiotis
    MODELS, ALGORITHMS, LOGICS AND TOOLS: ESSAYS DEDICATED TO KIM GULDSTRAND LARSEN ON THE OCCASION OF HIS 60TH BIRTHDAY, 2017, 10460 : 3 - 21
  • [2] Information flow analysis for probabilistic timed automata
    Lanotte, R
    Maggiolo-Schettini, A
    Troina, A
    FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 13 - 26
  • [3] Modelling Secure Wireless Sensor Networks Routing Protocols with Timed Automata
    Tobarra, Llanos
    Cazorla, Diego
    Cuartero, Fernando
    Jose Pardo, J.
    PM2HW2N'08: PROCEEDINGS OF THE THIRD ACM INTERNATIONAL WORKSHOP ON PERFORMANCE MONITORING, MEASUREMENT, AND EVALUATION OF HETEROGENEOUS WIRELESS AND WIRED NETWORKS, 2008, : 51 - 58
  • [4] Timed automata
    Alur, R
    VERIFICATION OF DIGITAL AND HYBRID SYSTEM, 2000, 170 : 233 - 264
  • [5] A Compositional Translation of Timed Automata with Deadlines to UPPAAL Timed Automata
    Gomez, Rodolfo
    FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, PROCEEDINGS, 2009, 5813 : 179 - 194
  • [6] Timed unfoldings for networks of timed automata
    Bouyer, Patricia
    Haddad, Serge
    Reynier, Pierre-Alain
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2006, 4218 : 292 - 306
  • [7] Provably secure timed-release public key encryption
    Cheon, Jung Hee
    Hopper, Nicholas
    Kim, Yongdae
    Osipkov, Ivan
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (02)
  • [8] Timed patterns: TCOZ to timed automata
    Dong, JS
    Hao, P
    Qin, SC
    Sun, J
    Yi, W
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2004, 3308 : 483 - 498
  • [9] A Versatile Secure Protocol for Anonymous Timed-Release Encryption
    Hristu-Varsakelis, D.
    Chalkias, K.
    Stephanides, G.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (01): : 80 - 88
  • [10] Provably Secure Timed-Release Proxy Conditional Reencryption
    Fan, Chun-I
    Chen, Jun-Cheng
    Huang, Shi-Yuan
    Huang, Jheng-Jia
    Chen, Wen-Tsuen
    IEEE SYSTEMS JOURNAL, 2017, 11 (04): : 2291 - 2302