At Design-Time Approach for Supervisory Control of Opacity

被引:1
|
作者
Souid, Nour Elhouda [1 ,2 ]
Klai, Kais [2 ]
Abid, Chiheb Ameur [3 ]
Ben Ahmed, Samir [2 ]
机构
[1] Univ Sorbonne Paris Nord, LIPN UMR CNRS 7030, Villetaneuse, France
[2] Univ Tunis El Manar, LIPSIC Lab, Fac Sci Tunis, Tunis, Tunisia
[3] Univ Tunis El Manar, Mediatron Lab, SupCom, Tunis, Tunisia
关键词
Security; Information flow; Opacity; Supervisory control theory; Formal methods;
D O I
10.1007/978-3-031-17834-4_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opacity is a property of information flow that characterizes the ability of a system to keep a secret information hidden from a malicious external entity, called an attacker. Given a critical system that may leak confidential information, an attacker with partial observation of the system and a subset of controllable actions, we propose an approach to synthesize a controller that enforces the system's opacity. This controller is designed as a function that applies, at run time, to the current execution to disable any controllable action that eventually leads to the violation of the opacity of the system. The supervision function is built at design time based on a new version of the symbolic observation graph that represents a reduced abstraction of the state space graph of the system preserving the observation of both the attacker and the controller. The language induced by this function is proven to be controllable, observable and supremal no matter the relation that exists between the observations of the attacker and the controller.
引用
收藏
页码:37 / 54
页数:18
相关论文
共 50 条
  • [41] Supervisory control design for real-time discrete event systems
    Schneider, O
    de Ridder, M
    Spathopoulos, M
    UKACC INTERNATIONAL CONFERENCE ON CONTROL '98, VOLS I&II, 1998, : 838 - 844
  • [42] Chat GPT-Based Design-Time DevSecOps
    Petrovic, Nenad
    2023 58TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION, COMMUNICATION AND ENERGY SYSTEMS AND TECHNOLOGIES, ICEST, 2023, : 143 - 146
  • [43] Towards a Comprehensive Design-time Compliance Management: A Roadmap
    Elgammal, Amal
    Turetken, Oktay
    van den Heuvel, Willem-Jan
    Papazoglou, Mike
    KNOWLEDGE MANAGEMENT AND INNOVATION: A BUSINESS COMPETITIVE EDGE PERSPECTIVE, VOLS 1-3, 2010, : 1480 - 1484
  • [44] Prototype for Design-time Secure and Trustworthy Service Composition
    Zhou, Bo
    Llewellyn-Jones, David
    Shi, Qi
    Asim, Muhammad
    Merabti, Madjid
    2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 847 - 848
  • [45] A Joint Benchmark-Analytic Approach For Design-Time Assessment of Multi-Cloud Applications
    Evangelinou, Ahanasia
    Ciavotta, Michele
    Kousiouris, George
    Ardagna, Danilo
    1ST INTERNATIONAL CONFERENCE ON CLOUD FORWARD: FROM DISTRIBUTED TO COMPLETE COMPUTING, 2015, 68 : 67 - 77
  • [46] Design for Security Test on Cryptographic ICs for Design-Time Security Evaluation
    Shao, Cuiping
    Li, Huiyun
    Xu, Guoqing
    Hu, Xiaobo
    2014 9TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2014, : 118 - 123
  • [47] Supervisory Control of Discrete-Event Systems for Infinite-Step Opacity
    Xie, Yifan
    Yin, Xiang
    2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 3665 - 3671
  • [48] Opacity of Networked Supervisory Control Systems over Insecure Multiple Channel Networks
    Yin, Xiang
    Li, Shaoyuan
    2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 7641 - 7646
  • [49] Design-time Compliance of Service Compositions in Dynamic Service Environments
    Groefsema, Heerko
    van Beest, Nick
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2015, : 108 - 115
  • [50] Bomberman: Defining and defeating hardware ticking timebombs at design-time
    Trippel, Timothy
    Shin, Kang G.
    Bush, Kevin B.
    Hicks, Matthew
    Proceedings - IEEE Symposium on Security and Privacy, 2021, 2021-May : 970 - 986