Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Timed automata as a formalism for expressing security: A survey on theory and practice
J Arcile, É André - ACM Computing Surveys, 2022 - dl.acm.org
Timed automata are a common formalism for the verification of concurrent systems subject to
timing constraints. They extend finite-state automata with clocks, that constrain the system …
timing constraints. They extend finite-state automata with clocks, that constrain the system …
Guaranteeing timed opacity using parametric timed model checking
Information leakage can have dramatic consequences on systems security. Among harmful
information leaks, the timing information leakage occurs whenever an attacker successfully …
information leaks, the timing information leakage occurs whenever an attacker successfully …
The dark side of timed opacity
F Cassez - International conference on information security and …, 2009 - Springer
In this paper we extend the notion of opacity, defined for discrete-event systems, to dense-
time systems. We define the timed opacity problem for timed automata and study its …
time systems. We define the timed opacity problem for timed automata and study its …
The opacity of real-time automata
Opacity is an important property on information flow to guarantee that a system under attack
keeps its “secrets”, possibly subsets of traces (language-based opacity) or subsets of states …
keeps its “secrets”, possibly subsets of traces (language-based opacity) or subsets of states …
Configuring timing parameters to ensure execution-time opacity in timed automata
Timing information leakage occurs whenever an attacker successfully deduces confidential
internal information by observing some timed information such as events with timestamps …
internal information by observing some timed information such as events with timestamps …
Expiring opacity problems in parametric timed automata
Information leakage can have dramatic consequences on the security of real-time systems.
Timing leaks occur when an attacker is able to infer private behavior depending on timing …
Timing leaks occur when an attacker is able to infer private behavior depending on timing …
The bright side of timed opacity
Abstract In 2009, Franck Cassez showed that the timed opacity problem, where an attacker
can observe some actions with their timestamps and attempts to deduce information, is …
can observe some actions with their timestamps and attempts to deduce information, is …
strategFTO: Untimed control for timed opacity
We introduce a prototype tool strategFTO addressing the verification of a security property in
critical software. We consider a recent definition of timed opacity where an attacker aims to …
critical software. We consider a recent definition of timed opacity where an attacker aims to …
Control and synthesis of non-interferent timed systems
We focus on the control and the synthesis of secure timed systems which are modelled as
timed automata. The security property that the system must satisfy is a non-interference …
timed automata. The security property that the system must satisfy is a non-interference …
Opacity-enforcing supervisory strategies for secure discrete event systems
A Saboori, CN Hadjicostis - 2008 47th IEEE conference on …, 2008 - ieeexplore.ieee.org
Initial-state opacity emerges as a key property in numerous security applications of discrete
event systems including key-stream generators for cryptographic protocols. Specifically, a …
event systems including key-stream generators for cryptographic protocols. Specifically, a …