2012
DOI: 10.1007/s10703-012-0141-9
|View full text |Cite
|
Sign up to set email alerts
|

Synthesis of opaque systems with static and dynamic masks

Abstract: Opacity is a security property formalizing the absence of secret information leakage and we address in this paper the problem of synthesizing opaque systems. A secret predicate S over the runs of a system G is opaque to an external user having partial observability over G, if s/he can never infer from the observation of a run of G that the run belongs to S. We choose to control the observability of events by adding a device, called a mask, between the system G and the users. We first investigate the case of st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
77
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 136 publications
(79 citation statements)
references
References 29 publications
1
77
0
1
Order By: Relevance
“…Our approach does not only consist of checking whether opacity holds, but also provides the means to control a system in such a way that observed traces are not sufficient to decide whether the current state of the system is a secret one. Another enforcement technique was proposed by Cassez et al (2012). This approach consists of dynamically changing the observation of an attacker using masks that hide a subset of transition labels that would otherwise be seen by the attacker.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Our approach does not only consist of checking whether opacity holds, but also provides the means to control a system in such a way that observed traces are not sufficient to decide whether the current state of the system is a secret one. Another enforcement technique was proposed by Cassez et al (2012). This approach consists of dynamically changing the observation of an attacker using masks that hide a subset of transition labels that would otherwise be seen by the attacker.…”
Section: Resultsmentioning
confidence: 99%
“…The verification of opacity is then reduced to the question of reachability of F = 2 S in Det A (G). This verification is PSPACE-complete (Cassez et al, 2012) in the standard setting where attackers observe only a subset of the labels attached to transitions (defined as attacker A 1 later in this section). As G is deterministic, Proposition 1 can be rephrased as a property of Det A (G).…”
Section: General Notion Of Opacitymentioning
confidence: 99%
See 2 more Smart Citations
“…The opacity problem consists in determining whether an observer, who knows the system's behavior but who imperfectly observes it, is able to reconstruct critical information (e.g., a password stored in a file, the value of some hidden variables, etc.). More precisely, the setting of state-based opacity (Cassez et al 2012) considers a discrete event system having a subset of unobservable events, and a subset of secret states. Then the problem amounts to determining whether it is possible to infer, from observation of the system, if it has reached a secret state.…”
Section: Introductionmentioning
confidence: 99%