论文标题
确保您的意图:在离散事件系统中的概念上
Secure Your Intention: On Notions of Pre-Opacity in Discrete-Event Systems
论文作者
论文摘要
本文研究了一个重要的信息流安全性属性,称为不透明的离散事件系统中的不透明度。我们考虑存在一个被动入侵者(Eavesdropper)的存在,该被动入侵者知道系统的动态模型,并可以使用生成的信息流来推断系统的“秘密”。如果系统始终对其秘密具有合理的可否认性,则据说它是不透明的。现有的不透明度观念仅考虑秘密,因为目前正在访问某些秘密国家,或者过去曾访问过一些秘密国家。在本文中,我们通过将系统的秘密视为未来执行某些特定重要行为的意图,从一个新角度研究信息流安全性。为此,我们提出了一个新的不透明度,称为敞开前,该类别的特征是入侵者是否可以预测秘密状态的访问,在系统实际这样做之前,一定数量的步骤。根据入侵者的预测任务,我们提出了两种特定类型的预性前,称为k-step Instant Pre-Op-opacity和K-STEP轨迹前畅通,以指定此概念。对于每个敞开前的概念,我们提供了必要和充分的条件以及有效的验证算法。验证前验证的复杂性在系统的大小上是指数的,因为我们表明前敞开是固有的pspace-hard。最后,我们将设置概括为系统的秘密意图被建模为执行特定事件序列而不是访问秘密状态。
This paper investigates an important informationflow security property called opacity in partially-observed discrete-event systems. We consider the presence of a passive intruder (eavesdropper) that knows the dynamic model of the system and can use the generated information-flow to infer some "secret" of the system. A system is said to be opaque if it always holds the plausible deniability for its secret. Existing notions of opacity only consider secret either as currently visiting some secret states or as having visited some secret states in the past. In this paper, we investigate information-flow security from a new angle by considering the secret of the system as the intention to execute some particular behavior of importance in the future. To this end, we propose a new class of opacity called pre-opacity that characterizes whether or not the intruder can predict the visit of secret states a certain number of steps ahead before the system actually does so. Depending the prediction task of the intruder, we propose two specific kinds of pre-opacity called K-step instant pre-opacity and K-step trajectory pre-opacity to specify this concept. For each notion of pre-opacity, we provide a necessary and sufficient condition as well as an effective verification algorithm. The complexity for the verification of pre-opacity is exponential in the size of the system as we show that pre-opacity is inherently PSPACE-hard. Finally, we generalize our setting to the case where the secret intention of the system is modeled as executing a particular sequence of events rather than visiting a secret state.