2019
DOI: 10.1007/978-3-030-25540-4_10
|View full text |Cite
|
Sign up to set email alerts
|

Security-Aware Synthesis Using Delayed-Action Games

Abstract: Stochastic multiplayer games (SMGs) have gained attention in the field of strategy synthesis for multi-agent reactive systems. However, standard SMGs are limited to modeling systems where all agents have full knowledge of the state of the game. In this paper, we introduce delayed-action games (DAGs) formalism that simulates hiddeninformation games (HIGs) as SMGs, where hidden information is captured by delaying a player's actions. The elimination of private variables enables the usage of SMG off-the-shelf mode… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…This work is motivated by the reported susceptibility of autonomous systems to attacks [1], [3], [26]. Several methods are proposed to deal with attacks on system sensing, both for low-level control (e.g., [27]- [29]), and path planning (e.g., [30], [31]). However, to the best of our knowledge, no methods exist to design controller strategies for uncertain environments, such that the derived controllers are maximally resilient to actuation attacks -this is the focus of this work.…”
Section: Problem Statement: Security-aware Planningmentioning
confidence: 99%
“…This work is motivated by the reported susceptibility of autonomous systems to attacks [1], [3], [26]. Several methods are proposed to deal with attacks on system sensing, both for low-level control (e.g., [27]- [29]), and path planning (e.g., [30], [31]). However, to the best of our knowledge, no methods exist to design controller strategies for uncertain environments, such that the derived controllers are maximally resilient to actuation attacks -this is the focus of this work.…”
Section: Problem Statement: Security-aware Planningmentioning
confidence: 99%