{"title":"Measuring Opacity for Non-Probabilistic DES: a SOG-Based Approach","authors":"Amina Bourouis, Kais Klai, N. Hadj-Alouane","doi":"10.1109/ICECCS.2019.00034","DOIUrl":null,"url":null,"abstract":"A system is opaque w.r.t. a secret and an observation map if for every run that leads to the secret, there exists at least one equivalent run which does not. The dichotomy of this definition, however, fails to measure just how much information the system keeps hidden. In fact, a system can be deemed opaque due to a single non-secret run, among an overwhelming number of secret equivalents. In this paper, we wish to redeem this drawback by the means of quantifying opacity into an opacity degree measuring the security of a system. After we formalize this numeral value for both the system and its corresponding Symbolic Observation Graph (SOG), we enhance our findings using a case study and some experimentation.","PeriodicalId":432828,"journal":{"name":"2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCS.2019.00034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
A system is opaque w.r.t. a secret and an observation map if for every run that leads to the secret, there exists at least one equivalent run which does not. The dichotomy of this definition, however, fails to measure just how much information the system keeps hidden. In fact, a system can be deemed opaque due to a single non-secret run, among an overwhelming number of secret equivalents. In this paper, we wish to redeem this drawback by the means of quantifying opacity into an opacity degree measuring the security of a system. After we formalize this numeral value for both the system and its corresponding Symbolic Observation Graph (SOG), we enhance our findings using a case study and some experimentation.