Run-time enforcement of nonsafety policies

J Ligatti, L Bauer, D Walker - ACM Transactions on Information and …, 2009 - dl.acm.org
A common mechanism for ensuring that software behaves securely is to monitor programs at
run time and check that they dynamically adhere to constraints specified by a security policy …

ARMET: Behavior-based secure and resilient industrial control systems

MT Khan, D Serpanos, H Shrobe - Proceedings of the IEEE, 2017 - ieeexplore.ieee.org
In this paper, we introduce a design methodology to develop reliable and secure industrial
control systems (ICSs) based on the behavior of their computational resources (ie …

On runtime enforcement via suppressions

L Aceto, I Cassar, A Francalanza… - arxiv preprint arxiv …, 2018 - arxiv.org
Runtime enforcement is a dynamic analysis technique that uses monitors to enforce the
behaviour specified by some correctness property on an executing system. The …

[PDF][PDF] Module checking of strategic ability.

W Jamroga, A Murano - AAMAS, 2015 - ipipan.waw.pl
Module checking is a decision problem proposed in late 1990s to formalize verification of
open systems, ie, systems that must adapt their behavior to the input they receive from the …

[PDF][PDF] On module checking and strategies

W Jamroga, A Murano - … of the 2014 international conference on …, 2014 - ifaamas.org
Two decision problems are very close in spirit: module checking of CTL/CTL* and model
checking of ATL/ATL*. The latter appears to be a natural multi-agent extension of the former …

Enforcing information flow security properties in cyber-physical systems: A generalized framework based on compensation

TT Gamage, BM McMillin… - 2010 IEEE 34th Annual …, 2010 - ieeexplore.ieee.org
This paper presents a general theory of event compensation as an information flow security
enforcement mechanism for Cyber-Physical Systems (CPSs). The fundamental research …

Dynamic compact visualizations for augmented reality

M Tatzgern, D Kalkofen… - 2013 IEEE Virtual Reality …, 2013 - ieeexplore.ieee.org
In Augmented Reality (AR), careless augmentations can easily lead to information overflow.
Especially on small screen devices, only a limited amount of information can be displayed …

On first-order runtime enforcement of branching-time properties

L Aceto, I Cassar, A Francalanza, A Ingólfsdóttir - Acta Informatica, 2023 - Springer
Runtime enforcement is a dynamic analysis technique that uses monitors to enforce the
behaviour specified by some correctness property on an executing system. The …

Security policy compliance with violation management

J Brunel, F Cuppens, N Cuppens, T Sans… - Proceedings of the …, 2007 - dl.acm.org
A security policy of an information system is a set of security requirements that correspond to
permissions, prohibitions and obligations to execute some actions when some contextual …

Design and run-time aspects of secure cyber-physical systems

AP Fournaris, A Komninos, AS Lalos… - Security and Quality in …, 2019 - Springer
Abstract Cyber-Physical Systems (CPSs) combine computational and physical components
enabling real-world interaction. Digitization, decentralization, and high connectivity, as well …