DeepAI AI Chat
Log In Sign Up

Quantifying Attacker Capability Via Model Checking Multiple Properties (Extended Version)

by   Eric Rothstein-Morris, et al.

This work aims to solve a practical problem, i.e., how to quantify the risk brought upon a system by different attackers. The answer is useful for optimising resource allocation for system defence. Given a set of safety requirements, we quantify the attacker capability in terms of the set of safety requirements an attacker can compromise. Given a system (in the presence of an attacker), model checking it against each safety requirement one by one is expensive and wasteful since the same state space is explored many times. We thus propose model checking multiple properties efficiently by means of coalgebraic model checking using enhanced coinduction techniques. We apply the proposed technique to a real-world water treatment system and the results show that our approach can effectively reduce the effort required for model checking.


Critical trees: counterexamples in model checking of CSM systems using CBS algorithm

The important feature of temporal model checking is the generation of co...

Systematic Classification of Attackers via Bounded Model Checking

In this work, we study the problem of verification of systems in the pre...

Probabilistic Model Checking of Robots Deployed in Extreme Environments

Robots are increasingly used to carry out critical missions in extreme e...

Monotonic Safety for Scalable and Data-Efficient Probabilistic Safety Analysis

Autonomous systems with machine learning-based perception can exhibit un...

Chiefly Symmetric: Results on the Scalability of Probabilistic Model Checking for Operating-System Code

Reliability in terms of functional properties from the safety-liveness s...

Conservative Safety Monitors of Stochastic Dynamical Systems

Generating accurate runtime safety estimates for autonomous systems is v...

Guaranteeing Timed Opacity using Parametric Timed Model Checking

Information leakage can have dramatic consequences on systems security. ...