{"title":"Private runtime verification: work-in-progress","authors":"Houssam Abbas","doi":"10.1145/3349568.3351552","DOIUrl":null,"url":null,"abstract":"Complex systems require runtime monitoring of their operation, and this task can be performed by a separate monitoring process. A hacked monitor however could use the system traces it receives to attack the system or leak the information to competitors. We introduce private runtime verification, in which the monitoring process learns nothing about the traces, and yet is still able to correctly monitor them for satisfaction of temporal specifications.","PeriodicalId":233835,"journal":{"name":"Proceedings of the International Conference on Embedded Software Companion","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the International Conference on Embedded Software Companion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3349568.3351552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Complex systems require runtime monitoring of their operation, and this task can be performed by a separate monitoring process. A hacked monitor however could use the system traces it receives to attack the system or leak the information to competitors. We introduce private runtime verification, in which the monitoring process learns nothing about the traces, and yet is still able to correctly monitor them for satisfaction of temporal specifications.