Automated Game-Theoretic Verification of Security Systems

被引:0
|
作者
Mu, Chunyan [1 ]
机构
[1] Teesside Univ, Dept Comp Sci, Middlesbrough, Cleveland, England
基金
英国工程与自然科学研究理事会;
关键词
Quantitative verification; Game theory; Security; POLYNOMIAL SYSTEMS; NASH EQUILIBRIA; ALGORITHM;
D O I
10.1007/978-3-030-30281-8_14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security-sensitive computerised communication systems are of increasing importance, however checking that they function correctly can be non-trivial. We propose automated verification techniques for the formal analysis of quantitative properties of such systems. Since communication networks typically require the collaboration of their participants to work effectively, we adopt a game-theoretic approach. Utility functions for each player, such as the degree of security offered and the communication costs incurred, are formally specified using quantitative temporal logics. Then, building upon probabilistic verification techniques for parametric Markov chains, we develop methods to identify Nash equilibria representing stable strategies for the participants. We implement our methods as an extension of the PRISM model checker, and illustrate their applicability by studying anonymity-cost trade-offs in the Crowds anonymity protocol.
引用
收藏
页码:239 / 256
页数:18
相关论文
共 50 条
  • [31] A Game-Theoretic Analysis of the Social Impact of Connected and Automated Vehicles
    Chremos, Ioannis Vasileios
    Beaver, Logan E.
    Malikopoulos, Andreas A.
    [J]. 2020 IEEE 23RD INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2020,
  • [32] Balance of power versus collective security: A game-theoretic analysis
    Niou, EMS
    Ordeshook, PC
    [J]. STRATEGIC STABILITY IN THE POST COLD-WAR WORLD AND THE FUTURE OF NUCLEAR DISARMAMENT, 1996, 3 : 179 - 190
  • [33] Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets
    Hota, Ashish R.
    Clements, Abraham A.
    Sundaram, Shreyas
    Bagchi, Saurabh
    [J]. DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 101 - 113
  • [34] Game-theoretic probability
    Shafer, Glenn
    [J]. 2008 ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY, VOLS 1 AND 2, 2008, : 850 - 851
  • [35] Game-theoretic preliminaries
    不详
    [J]. INFORMATION DISSEMINATION IN CURRENCY CRISES, 2003, 527 : 33 - 52
  • [36] GTBNN: game-theoretic and bayesian neural networks to tackle security attacks in intelligent transportation systems
    Gill, Komal Singh
    Saxena, Sharad
    Sharma, Anju
    Dhillon, Arwinder
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08): : 11645 - 11665
  • [37] A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems
    Pirani, Mohammad
    Nekouei, Ehsan
    Sandberg, Henrik
    Johansson, Karl Henrik
    [J]. 2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, : 114 - 119
  • [38] A Game-Theoretic Framework for Security-Aware Sensor Placement Problem in Networked Control Systems
    Pirani, Mohammad
    Nekouei, Ehsan
    Sandberg, Henrik
    Johansson, Karl Henrik
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (07) : 3699 - 3706
  • [39] BALANCE OF POWER IN INTERNATIONAL SYSTEMS - A GAME-THEORETIC ANALYSIS
    NIOU, E
    ORDESHOOK, P
    [J]. MATHEMATICAL SOCIAL SCIENCES, 1989, 18 (02) : 193 - 193
  • [40] Infinite States Verification in Game-Theoretic Logics: Case Studies and Implementation
    Kmiec, Slawomir
    Lesperance, Yves
    [J]. ENGINEERING MULTI-AGENT SYSTEMS, EMAS 2014, 2014, 8758 : 271 - 290