Work-In-Progress: Private Runtime Verification

作者: Houssam Abbas

DOI:

关键词:

摘要: Complex systems require runtime monitoring of their operation, and this task can be performed by a separate process. A hacked monitor however could use the system traces it receives to attack or leak information competitors. We introduce private verification, in which process learns nothing about traces, yet is still able correctly them for satisfaction temporal specifications.

参考文章(4)
Andreas Bauer, Martin Leucker, Christian Schallhart, Runtime Verification for LTL and TLTL ACM Transactions on Software Engineering and Methodology. ,vol. 20, pp. 1- 64 ,(2011) , 10.1145/2000799.2000800
Hao Chen, Kim Laine, Peter Rindal, Fast Private Set Intersection from Homomorphic Encryption computer and communications security. pp. 1243- 1255 ,(2017) , 10.1145/3133956.3134061
Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu, None, Practical Multi-party Private Set Intersection from Symmetric-Key Techniques computer and communications security. pp. 1257- 1272 ,(2017) , 10.1145/3133956.3134065
Mike Rosulek, Vladimir Kolesnikov, David Evans, A Pragmatic Introduction to Secure Multi-Party Computation ,(2019)