Synthesis of insertion functions for enforcement of opacity security properties

Opacity is a confidentiality property that characterizes whether a “secret” of a system can be inferred by an outside observer called an “intruder”. In this paper, we consider the problem of enforcing opacity in systems modeled as partially-observed finite-state automata. We propose a novel enforcem...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Automatica (Oxford) 2014-05, Vol.50 (5), p.1336-1348
Hauptverfasser: Wu, Yi-Chin, Lafortune, Stéphane
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1348
container_issue 5
container_start_page 1336
container_title Automatica (Oxford)
container_volume 50
creator Wu, Yi-Chin
Lafortune, Stéphane
description Opacity is a confidentiality property that characterizes whether a “secret” of a system can be inferred by an outside observer called an “intruder”. In this paper, we consider the problem of enforcing opacity in systems modeled as partially-observed finite-state automata. We propose a novel enforcement mechanism based on the use of insertion functions. An insertion function is a monitoring interface at the output of the system that changes the system’s output behavior by inserting additional observable events. We define the property of “i-enforceability” that an insertion function needs to satisfy in order to enforce opacity. I-enforceability captures an insertion function’s ability to respond to every system’s observed behavior and to output only modified behaviors that look like existing non-secret behaviors. Given an insertion function, we provide an algorithm that verifies whether it is i-enforcing. More generally, given an opacity notion, we determine whether it is i-enforceable or not by constructing a structure called the “All Insertion Structure” (AIS). The AIS enumerates all i-enforcing insertion functions in a compact state transition structure. If a given opacity notion has been verified to be i-enforceable, we show how to use the AIS to synthesize an i-enforcing insertion function.
doi_str_mv 10.1016/j.automatica.2014.02.038
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1671621276</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0005109814000764</els_id><sourcerecordid>1671621276</sourcerecordid><originalsourceid>FETCH-LOGICAL-c447t-d9a1fe7f60a296318e173c192960f563f8a264f5e7ddfcd1fda2fbca47da4cb23</originalsourceid><addsrcrecordid>eNqFkE9rGzEQxUVIIU6a77CXQi-7lbRrST62JkkLBh_anoU8OyIytuRqtAV_-2ixSY-9zB_4vXnMY6wRvBNcqC_7zk0lHV0J4DrJxdBx2fHe3LCFMLpvpenVLVtwzpet4Ctzx-6J9nUdhJELtv15juUVKVCTfBMiYS4hxcZPEeaBGp9yg7FWwCPGMmPp5CCUc0MIU56HU06nWYj0kX3w7kD4eO0P7Pfz06_193azffmx_rppYRh0aceVEx61V9zJleqFQaF7EKu6cL9UvTdOqsEvUY-jh1H40Um_Azfo0Q2wk_0D-3y5W63_TEjFHgMBHg4uYprICqWFkkJqVVFzQSEnoozennI4uny2gts5Q7u3_zK0c4aWS1szrNJPVxdH4A4-uwiB3vXSDL3Welm5bxcO68t_A2ZLEDACjiEjFDum8H-zN3e5j00</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1671621276</pqid></control><display><type>article</type><title>Synthesis of insertion functions for enforcement of opacity security properties</title><source>ScienceDirect Journals (5 years ago - present)</source><creator>Wu, Yi-Chin ; Lafortune, Stéphane</creator><creatorcontrib>Wu, Yi-Chin ; Lafortune, Stéphane</creatorcontrib><description>Opacity is a confidentiality property that characterizes whether a “secret” of a system can be inferred by an outside observer called an “intruder”. In this paper, we consider the problem of enforcing opacity in systems modeled as partially-observed finite-state automata. We propose a novel enforcement mechanism based on the use of insertion functions. An insertion function is a monitoring interface at the output of the system that changes the system’s output behavior by inserting additional observable events. We define the property of “i-enforceability” that an insertion function needs to satisfy in order to enforce opacity. I-enforceability captures an insertion function’s ability to respond to every system’s observed behavior and to output only modified behaviors that look like existing non-secret behaviors. Given an insertion function, we provide an algorithm that verifies whether it is i-enforcing. More generally, given an opacity notion, we determine whether it is i-enforceable or not by constructing a structure called the “All Insertion Structure” (AIS). The AIS enumerates all i-enforcing insertion functions in a compact state transition structure. If a given opacity notion has been verified to be i-enforceable, we show how to use the AIS to synthesize an i-enforcing insertion function.</description><identifier>ISSN: 0005-1098</identifier><identifier>EISSN: 1873-2836</identifier><identifier>DOI: 10.1016/j.automatica.2014.02.038</identifier><identifier>CODEN: ATCAA9</identifier><language>eng</language><publisher>Kidlington: Elsevier Ltd</publisher><subject>Algorithms ; Applied sciences ; Computer science; control theory; systems ; Discrete event systems ; Exact sciences and technology ; Insertion ; Mathematical models ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Monitoring ; Observers ; Opacity ; Security ; Software ; Synthesis</subject><ispartof>Automatica (Oxford), 2014-05, Vol.50 (5), p.1336-1348</ispartof><rights>2014 Elsevier Ltd</rights><rights>2015 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c447t-d9a1fe7f60a296318e173c192960f563f8a264f5e7ddfcd1fda2fbca47da4cb23</citedby><cites>FETCH-LOGICAL-c447t-d9a1fe7f60a296318e173c192960f563f8a264f5e7ddfcd1fda2fbca47da4cb23</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.automatica.2014.02.038$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,27924,27925,45995</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=28437775$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Wu, Yi-Chin</creatorcontrib><creatorcontrib>Lafortune, Stéphane</creatorcontrib><title>Synthesis of insertion functions for enforcement of opacity security properties</title><title>Automatica (Oxford)</title><description>Opacity is a confidentiality property that characterizes whether a “secret” of a system can be inferred by an outside observer called an “intruder”. In this paper, we consider the problem of enforcing opacity in systems modeled as partially-observed finite-state automata. We propose a novel enforcement mechanism based on the use of insertion functions. An insertion function is a monitoring interface at the output of the system that changes the system’s output behavior by inserting additional observable events. We define the property of “i-enforceability” that an insertion function needs to satisfy in order to enforce opacity. I-enforceability captures an insertion function’s ability to respond to every system’s observed behavior and to output only modified behaviors that look like existing non-secret behaviors. Given an insertion function, we provide an algorithm that verifies whether it is i-enforcing. More generally, given an opacity notion, we determine whether it is i-enforceable or not by constructing a structure called the “All Insertion Structure” (AIS). The AIS enumerates all i-enforcing insertion functions in a compact state transition structure. If a given opacity notion has been verified to be i-enforceable, we show how to use the AIS to synthesize an i-enforcing insertion function.</description><subject>Algorithms</subject><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Discrete event systems</subject><subject>Exact sciences and technology</subject><subject>Insertion</subject><subject>Mathematical models</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Monitoring</subject><subject>Observers</subject><subject>Opacity</subject><subject>Security</subject><subject>Software</subject><subject>Synthesis</subject><issn>0005-1098</issn><issn>1873-2836</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNqFkE9rGzEQxUVIIU6a77CXQi-7lbRrST62JkkLBh_anoU8OyIytuRqtAV_-2ixSY-9zB_4vXnMY6wRvBNcqC_7zk0lHV0J4DrJxdBx2fHe3LCFMLpvpenVLVtwzpet4Ctzx-6J9nUdhJELtv15juUVKVCTfBMiYS4hxcZPEeaBGp9yg7FWwCPGMmPp5CCUc0MIU56HU06nWYj0kX3w7kD4eO0P7Pfz06_193azffmx_rppYRh0aceVEx61V9zJleqFQaF7EKu6cL9UvTdOqsEvUY-jh1H40Um_Azfo0Q2wk_0D-3y5W63_TEjFHgMBHg4uYprICqWFkkJqVVFzQSEnoozennI4uny2gts5Q7u3_zK0c4aWS1szrNJPVxdH4A4-uwiB3vXSDL3Welm5bxcO68t_A2ZLEDACjiEjFDum8H-zN3e5j00</recordid><startdate>20140501</startdate><enddate>20140501</enddate><creator>Wu, Yi-Chin</creator><creator>Lafortune, Stéphane</creator><general>Elsevier Ltd</general><general>Elsevier</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20140501</creationdate><title>Synthesis of insertion functions for enforcement of opacity security properties</title><author>Wu, Yi-Chin ; Lafortune, Stéphane</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c447t-d9a1fe7f60a296318e173c192960f563f8a264f5e7ddfcd1fda2fbca47da4cb23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Algorithms</topic><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Discrete event systems</topic><topic>Exact sciences and technology</topic><topic>Insertion</topic><topic>Mathematical models</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Monitoring</topic><topic>Observers</topic><topic>Opacity</topic><topic>Security</topic><topic>Software</topic><topic>Synthesis</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wu, Yi-Chin</creatorcontrib><creatorcontrib>Lafortune, Stéphane</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Automatica (Oxford)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wu, Yi-Chin</au><au>Lafortune, Stéphane</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Synthesis of insertion functions for enforcement of opacity security properties</atitle><jtitle>Automatica (Oxford)</jtitle><date>2014-05-01</date><risdate>2014</risdate><volume>50</volume><issue>5</issue><spage>1336</spage><epage>1348</epage><pages>1336-1348</pages><issn>0005-1098</issn><eissn>1873-2836</eissn><coden>ATCAA9</coden><abstract>Opacity is a confidentiality property that characterizes whether a “secret” of a system can be inferred by an outside observer called an “intruder”. In this paper, we consider the problem of enforcing opacity in systems modeled as partially-observed finite-state automata. We propose a novel enforcement mechanism based on the use of insertion functions. An insertion function is a monitoring interface at the output of the system that changes the system’s output behavior by inserting additional observable events. We define the property of “i-enforceability” that an insertion function needs to satisfy in order to enforce opacity. I-enforceability captures an insertion function’s ability to respond to every system’s observed behavior and to output only modified behaviors that look like existing non-secret behaviors. Given an insertion function, we provide an algorithm that verifies whether it is i-enforcing. More generally, given an opacity notion, we determine whether it is i-enforceable or not by constructing a structure called the “All Insertion Structure” (AIS). The AIS enumerates all i-enforcing insertion functions in a compact state transition structure. If a given opacity notion has been verified to be i-enforceable, we show how to use the AIS to synthesize an i-enforcing insertion function.</abstract><cop>Kidlington</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.automatica.2014.02.038</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0005-1098
ispartof Automatica (Oxford), 2014-05, Vol.50 (5), p.1336-1348
issn 0005-1098
1873-2836
language eng
recordid cdi_proquest_miscellaneous_1671621276
source ScienceDirect Journals (5 years ago - present)
subjects Algorithms
Applied sciences
Computer science
control theory
systems
Discrete event systems
Exact sciences and technology
Insertion
Mathematical models
Memory and file management (including protection and security)
Memory organisation. Data processing
Monitoring
Observers
Opacity
Security
Software
Synthesis
title Synthesis of insertion functions for enforcement of opacity security properties
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T11%3A46%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Synthesis%20of%20insertion%20functions%20for%20enforcement%20of%20opacity%20security%20properties&rft.jtitle=Automatica%20(Oxford)&rft.au=Wu,%20Yi-Chin&rft.date=2014-05-01&rft.volume=50&rft.issue=5&rft.spage=1336&rft.epage=1348&rft.pages=1336-1348&rft.issn=0005-1098&rft.eissn=1873-2836&rft.coden=ATCAA9&rft_id=info:doi/10.1016/j.automatica.2014.02.038&rft_dat=%3Cproquest_cross%3E1671621276%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1671621276&rft_id=info:pmid/&rft_els_id=S0005109814000764&rfr_iscdi=true