Abstract
Given a labelled transition system G partially observed by an attacker, and a regular predicate S e c over the runs of G, enforcing opacity of the secret S e c in G means computing a supervisory controller K such that an attacker who observes a run of the controlled system K/G cannot ascertain that the trace of this run belongs to S e c based on the knowledge of G and K. We lift the problem from a single labelled transition system G to the class of all labelled transition systems specified by a Modal Transition System M. The lifted problem is to compute the maximally permissive controller K such that S e c is opaque in K/G for every labelled transition system G which is a model of M. The situations of the attacker and of the controller are asymmetric: at run time, the attacker may fully know G and K whereas the controller knows only M and the sequence of actions executed so far by the unknown G. We address the problem in two cases. Let Σ a denote the set of actions that can be observed by the attacker, and let Σ c and Σ o denote the sets of actions that can be controlled and observed by the controller, respectively. We provide optimal and regular controllers that enforce the opacity of regular secrets when \({\Sigma }_{c}\subseteq {\Sigma }_{o}\subseteq {\Sigma }_{a}={\Sigma }\). We provide optimal and regular controllers that enforce the opacity of regular upper-closed secrets (S e c=S e c.Σ∗) under the following assumptions: (i) \({\Sigma }_{a}\subseteq {\Sigma }_{c}\subseteq {\Sigma }_{o}={\Sigma }\) or (ii) \({\Sigma }_{a},{\Sigma }_{c}\subseteq {\Sigma }_{o}={\Sigma }\) and \(w{\Sigma }\in Sec\Rightarrow w\in Sec\) for all Σ∈Σ∖Σ c .
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.