iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-3-031-42626-1_8
Timed Non-interference Under Partial Observability and Bounded Memory | SpringerLink
Skip to main content

Timed Non-interference Under Partial Observability and Bounded Memory

  • Conference paper
  • First Online:
Formal Modeling and Analysis of Timed Systems (FORMATS 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14138))

  • 189 Accesses

Abstract

We investigate a timed non-interference property for security systems modeled as timed automata, in which a low-security level user should not be able to deduce the occurrence of some high-security level actions. We assume an attack model in which the malicious (low-level) user has the ability to partially observe and memorize the set of runs of the timed automaton modeling the system.

We first formalize a non-interference property that ensures the system security under such an attack model and we then prove the undecidability of that property when the attacker can have an arbitrarily big memory, i.e., when they are able to memorize sequences of previous observations, with time-stamps, of any length. We next assume bounded memory for the attacker and show that the property can then be decided in PSPACE for a subclass of timed automata ensuring finite duration between distinct observations.

This work has been partially funded by ANR project ProMiS ANR-19-CE25-0015.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Regions without c-approximation, i.e. each point represent a reachable state of location \( \ell _{(A,B)}\) associated with given values of \(x_{new}\) and \(x_{old}\)

  2. 2.

    On this figure, regions are represented according to the original definition proposed by Alur & Dill ( [AD94]), that is with c-approximation, c being the largest synthaxic value used to define the automaton)

  3. 3.

    We also say the automaton is FDO w.r.t. \(\mathcal {O}\).

References

  1. Alur, R., Dill, D.L.: A theory of timed automata. Theor. Comput. Sci. 126(2), 183–235 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  2. Ammar, I., El Touati, Y., Yeddes, M., Mullins, J.: Bounded opacity for timed systems. J. Inf. Secur. Appl. 61, 102926 (2021)

    MATH  Google Scholar 

  3. André, É., Kryukov, A.: Parametric non-interference in timed automata. In: Proceedings of the 2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 37–42. IEEE (2020)

    Google Scholar 

  4. André, É., Lime, D., Marinho, D., Sun, J.: Guaranteeing timed opacity using parametric timed model checking. ACM Trans. Softw. Eng. Methodol. 31(4), 1–36 (2022)

    Article  Google Scholar 

  5. Arnold, A.: Finite Transition Systems. Prentice Hall (1994)

    Google Scholar 

  6. Bortz, A., Boneh, D.: Exposing private information by timing web applications. In: Proceedings of the 16th International Conference on World Wide Web, pp. 621–628 (2007)

    Google Scholar 

  7. Benattar, G., Cassez, F., Lime, D., Roux, O.H.: Control and synthesis of non-interferent timed systems. Int. J. Control 88(2), 217–236 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  8. Bryans, J., Koutny, M., Mazare, L., Ryan, Peter, Y.A.: Opacity generalised to transition systems. Int. J. Inf. Secur. 7(6), 421–435 (2008)

    Google Scholar 

  9. Barbuti, R., Tesei, L.: A decidable notion of timed non-interference. Fundam. Inform. 54(2–3), 137–150 (2003)

    MathSciNet  MATH  Google Scholar 

  10. Felten, E.W., Schneider, M.A.: Timing attacks on web privacy. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, CCS 2000, pp. 25–32. Association for Computing Machinery, New York (2000)

    Google Scholar 

  11. Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: Proceedings of the 1984 IEEE Symposium on Security and Privacy, pp. 75–75. IEEE (1984)

    Google Scholar 

  12. Gardey, G., Mullins, J., Roux, O.H.: Non-interference control synthesis for security timed automata. Electron. Notes Theor. Comput. Sci. 180(1), 35–53 (2007)

    Article  MATH  Google Scholar 

  13. Gerking, C., Schubert, D., Bodden, E.: Model checking the information flow security of real-time systems. In: Payer, M., Rashid, A., Such, J.M. (eds.) ESSoS 2018. LNCS, vol. 10953, pp. 27–43. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94496-8_3

    Chapter  Google Scholar 

  14. Kocher, PC.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_9

  15. Kotcher, R., Pei, Y., Jumde, P., Jackson, C.: Cross-origin pixel stealing: timing attacks using CSS filters. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security, pp. 1055–1062 (2013)

    Google Scholar 

  16. Wang, L., Zhan, N.: Decidability of the initial-state opacity of real-time automata. In: Jones, C., Wang, J., Zhan, N. (eds.) Symposium on Real-Time and Hybrid Systems. LNCS, vol. 11180, pp. 44–60. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01461-2_3

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anthony Spriet .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Spriet, A., Lime, D., Roux, O.H. (2023). Timed Non-interference Under Partial Observability and Bounded Memory. In: Petrucci, L., Sproston, J. (eds) Formal Modeling and Analysis of Timed Systems. FORMATS 2023. Lecture Notes in Computer Science, vol 14138. Springer, Cham. https://doi.org/10.1007/978-3-031-42626-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-42626-1_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-42625-4

  • Online ISBN: 978-3-031-42626-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics