TY - GEN
T1 - Automated Game-Theoretic Verification of Security Systems
AU - Mu, Chunyan
PY - 2019/10/18
Y1 - 2019/10/18
N2 - Security-sensitive computerised communication systems are of increasing importance, however checking that they function correctly can be non-trivial. We propose automated verification techniques for the formal analysis of quantitative properties of such systems. Since communication networks typically require the collaboration of their participants to work effectively, we adopt a game-theoretic approach. Utility functions for each player, such as the degree of security offered and the communication costs incurred, are formally specified using quantitative temporal logics. Then, building upon probabilistic verification techniques for parametric Markov chains, we develop methods to identify Nash equilibria representing stable strategies for the participants. We implement our methods as an extension of the PRISM model checker, and illustrate their applicability by studying anonymity-cost trade-offs in the Crowds anonymity protocol.
AB - Security-sensitive computerised communication systems are of increasing importance, however checking that they function correctly can be non-trivial. We propose automated verification techniques for the formal analysis of quantitative properties of such systems. Since communication networks typically require the collaboration of their participants to work effectively, we adopt a game-theoretic approach. Utility functions for each player, such as the degree of security offered and the communication costs incurred, are formally specified using quantitative temporal logics. Then, building upon probabilistic verification techniques for parametric Markov chains, we develop methods to identify Nash equilibria representing stable strategies for the participants. We implement our methods as an extension of the PRISM model checker, and illustrate their applicability by studying anonymity-cost trade-offs in the Crowds anonymity protocol.
U2 - 10.1007/978-3-030-30281-8_14
DO - 10.1007/978-3-030-30281-8_14
M3 - Published conference contribution
VL - 11785
T3 - Lecture Notes in Computer Science
SP - 239
EP - 256
BT - 16th International Conference on Quantitative Evaluation of Systems (QEST)
A2 - Parker, David
A2 - Wolf, Verena
PB - Springer
ER -