Synthesis of Non-Interferent Systems

In this paper, we focus on distributed systems sub ject to security issues. Such systems are usually composed of two entities: a high level user and a low level user that can both do some actions. The security properties we consider are non-interference properties. A system is non-interferent if the low level user cannot deduce any information by playing its low level actions. Various notions of non-interference have been defined in the literature, and in this paper we focus on two of them: one trace-based property (SNNI) and another bisimulation-based property (BSNNI). For these properties we study the problems of synthesis of a high level user so that the system is non-interferent. We prove that a most permissive high level user can be computed when one exists.

[1]  W. M. Wonham,et al.  The control of discrete event systems , 1989 .

[2]  The Synthesis toolbox From modal automata to controller synthesis , 2009 .

[3]  D. Kozen Results on the Propositional µ-Calculus , 1982 .

[4]  Wolfgang Thomas,et al.  On the Synthesis of Strategies in Infinite Games , 1995, STACS.

[5]  A. Arnold,et al.  Rudiments of μ-calculus , 2001 .

[6]  Igor Walukiewicz,et al.  Games for synthesis of controllers with partial observation , 2003, Theor. Comput. Sci..

[7]  Howard Wong-Toi,et al.  Symbolic Synthesis of Supervisory Controllers , 1992, 1992 American Control Conference.

[8]  P. Ramadge,et al.  Supervisory control of a class of discrete event processes , 1987 .

[9]  Johan Agat,et al.  Transforming out timing leaks , 2000, POPL '00.

[10]  Markus Müller-Olm Derivation of Characteristic Formulae , 1998, Electron. Notes Theor. Comput. Sci..

[11]  Sophie Pinchinat,et al.  Quantified Mu-Calculus for Control Synthesis , 2003, MFCS.

[12]  Olivier H. Roux,et al.  Non-Interference Control Synthesis for Security Timed Automata , 2007, Electron. Notes Theor. Comput. Sci..

[13]  Roberto Gorrieri,et al.  Classification of Security Properties (Part I: Information Flow) , 2000, FOSAD.

[14]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[15]  Kim G. Larsen,et al.  UPPAAL-Tiga: Time for Playing Games! , 2007, CAV.

[16]  Luca Aceto,et al.  Characteristic Formulae: From Automata to Logic , 2007, Bull. EATCS.

[17]  Ron van der Meyden,et al.  Algorithmic Verification of Noninterference Properties , 2007, VODCA@FOSAD.