Automated Game-Theoretic Verification of Security Systems

被引:0
|
作者
Mu, Chunyan [1 ]
机构
[1] Teesside Univ, Dept Comp Sci, Middlesbrough, Cleveland, England
基金
英国工程与自然科学研究理事会;
关键词
Quantitative verification; Game theory; Security; POLYNOMIAL SYSTEMS; NASH EQUILIBRIA; ALGORITHM;
D O I
10.1007/978-3-030-30281-8_14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security-sensitive computerised communication systems are of increasing importance, however checking that they function correctly can be non-trivial. We propose automated verification techniques for the formal analysis of quantitative properties of such systems. Since communication networks typically require the collaboration of their participants to work effectively, we adopt a game-theoretic approach. Utility functions for each player, such as the degree of security offered and the communication costs incurred, are formally specified using quantitative temporal logics. Then, building upon probabilistic verification techniques for parametric Markov chains, we develop methods to identify Nash equilibria representing stable strategies for the participants. We implement our methods as an extension of the PRISM model checker, and illustrate their applicability by studying anonymity-cost trade-offs in the Crowds anonymity protocol.
引用
收藏
页码:239 / 256
页数:18
相关论文
共 50 条
  • [1] CHECKMATE: Automated Game-Theoretic Security Reasoning
    Brugger, Lea Salome
    Kovacs, Laura
    Komel, Anja Petkovic
    Rain, Sophie
    Rawson, Michael
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1407 - 1421
  • [2] Rational verification: game-theoretic verification of multi-agent systems
    Alessandro Abate
    Julian Gutierrez
    Lewis Hammond
    Paul Harrenstein
    Marta Kwiatkowska
    Muhammad Najib
    Giuseppe Perelli
    Thomas Steeples
    Michael Wooldridge
    [J]. Applied Intelligence, 2021, 51 : 6569 - 6584
  • [3] Rational verification: game-theoretic verification of multi-agent systems
    Abate, Alessandro
    Gutierrez, Julian
    Hammond, Lewis
    Harrenstein, Paul
    Kwiatkowska, Marta
    Najib, Muhammad
    Perelli, Giuseppe
    Steeples, Thomas
    Wooldridge, Michael
    [J]. APPLIED INTELLIGENCE, 2021, 51 (09) : 6569 - 6584
  • [4] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    [J]. 47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [5] On Game-Theoretic Network Security Provisioning
    Stefan Rass
    [J]. Journal of Network and Systems Management, 2013, 21 : 47 - 64
  • [6] On Game-Theoretic Network Security Provisioning
    Rass, Stefan
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (01) : 47 - 64
  • [7] Game-Theoretic Security Analysis of Quantum Networks
    Rass, Stefan
    Schartner, Peter
    [J]. ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 20 - 25
  • [8] Decision-theoretic and game-theoretic approaches to IT security investment
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    Yue, Wei T.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) : 281 - 304
  • [9] Security of Vehicle Platooning: A Game-Theoretic Approach
    Basiri, Mohammad Hossein
    Pirani, Mohammad
    Azad, Nasser L.
    Fischmeister, Sebastian
    [J]. IEEE ACCESS, 2019, 7 : 185565 - 185579
  • [10] Game-Theoretic Framework for Integrity Verification in Computation Outsourcing
    Tang, Qiang
    Pejo, Balazs
    [J]. DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 472 - 473