2007
DOI: 10.1016/j.entcs.2005.05.046
|View full text |Cite
|
Sign up to set email alerts
|

Non-Interference Control Synthesis for Security Timed Automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 23 publications
(30 citation statements)
references
References 10 publications
0
30
0
Order By: Relevance
“…It is well-known (see e. g., [Koc96; FS00; BB07; Kot+13; Ben+15a]) that time is a potential attack vector against secure systems. That is, it is possible that a non-interferent (secure) system can become interferent (insecure) when timing constraints are added [GMR07]. In [Bar+02; BT03], a first notion of timed non-interference is proposed.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It is well-known (see e. g., [Koc96; FS00; BB07; Kot+13; Ben+15a]) that time is a potential attack vector against secure systems. That is, it is possible that a non-interferent (secure) system can become interferent (insecure) when timing constraints are added [GMR07]. In [Bar+02; BT03], a first notion of timed non-interference is proposed.…”
Section: Related Workmentioning
confidence: 99%
“…In [Bar+02; BT03], a first notion of timed non-interference is proposed. In [GMR07], Gardey et al define timed strong non-deterministic non-interference (SNNI) based on timed language equivalence between the automaton with hidden low-level actions and the automaton with removed low-level actions. Furthermore, they show that the problem of determining whether a timed automaton satisfies SNNI is undecidable.…”
Section: Related Workmentioning
confidence: 99%
“…Otherwise, if A e is false then Ψ e is true and thus (σ 11 , δ 11 ) ≡ Z(π(1)) (σ 12 , δ 12 ), because the two pairs are still low equivalent for the variables that are not used in the assignment of e, while the ones used in the assignment of e they do not appear in any condition (or expression) of an edge of a node q that belongs in π (1). 12 ) and the proof is completed using our induction hypothesis on t 2 . The proof of Main Case 1 follows by the result (a) of the fact from above, taking the path π that corresponds to the trace ( * ) and using that ( δ 2 ) and all the nodes in π except q k1 have edges whose conditions contain only low variables).…”
Section: Proof Of Lemmamentioning
confidence: 99%
“…To prove (a), let e = (q 01 , g → x := a: r, q 11 ) and note that because (σ 1 , δ 1 ) ≡ Z(π) (σ 2 , δ 2 ) and con(e) contains only low variables (since q 01 = q ∈ Q ;w and C1 (a)) it is immediate that there exists 12 . Now if l < n, to prove (b) we consider two cases.…”
Section: Proof Of Lemmamentioning
confidence: 99%
See 1 more Smart Citation