Top Banner
Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman, WA USA
22

Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Dec 13, 2015

Download

Documents

Donald Griffin
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Security of Numerical Sensors in Finite

AutomataZhe Dang

Dmitry DementyevThomas R. Fischer

William J. Hutton, III

Washington State University – Pullman, WA USA

Page 2: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Overview

• Introduction

• Mathematical foundation for computer security

• The “CIA” triad

• Covert channels

• Our theorems (with examples)

• Conclusion

Page 3: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Introduction

Page 4: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Mathematical foundation for

computer security

Ad hoc experiences are not science!

Page 5: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

The CIA triad

• Confidentiality• Integrity• Availability

Page 6: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Confidentiality“Confidentiality is the concealment of

information or resources.”

Page 7: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Covert channels

“A covert channel is a path of communication that was not designed to be used for

communication.” -- Matt Bishop

(Covert communication can be implicit!)

Page 8: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

A simple covert writer as a finite automata

Page 9: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

A simple covert reader as a finite automata

Page 10: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Our theorems

Theorem 2. I(G) = log M

Page 11: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Maximal mutual information

• Graph theory• Nodes, edges• Graphs, bipartite graphs, multi-bipartite

graphs• Matching, maximal matching

• Information theory• Mutual information• Entropy

Page 12: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Graph Theory

Nodes, edges, and connectedness

Page 13: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Graph Theory

Nodesleft Nodesright

Page 14: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Graph Theory

Nodesleft Nodesright

Page 15: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Secure Numerical Sensing in Automata

C

Multicounter Automata M

76543210

109876543210

321

0123210

V Reversal-Bounded Counters

V1 V2 V.. Vkhigh(C) low(V)

Page 16: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Secure Numerical Sensing in Automata

C

Multicounter Automata M

76543210

109876543210

321

0123210

V Reversal-Bounded Counters

V1 V2 V.. Vkhigh(C) = {Cn,,{7, 10, 3, 0}}

low(V) = 20

Page 17: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Theorems 3-6

3. The information rate of a regular language is computable [5].

4. A suffix-closed regular language is converging.

5. For a semilinear set V, [V] is a converging regular language.

6. For numerical sensors ‘low’ and ‘high’, when their set of measurements is effectively a semilinear set, the mutual information rate I(low, high) is computable.

Page 18: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Theorems 7-10

7. For integer numerical sensors ‘low’ and ‘high’, when their measurements set is Presburger definable, the mutual information rate I(low, high) is computable.

8. Suppose that ‘low’ and ‘high’ are linear numerical sensors in a reversal-bounded NPCM M. Then the mutual information rate I(low, high) is computable.

9. For a 2-tape NFA M, its mutual information rate I(low, high) is computable…

10. For a k-tape NFA M augmented with reversal-bounded counters its mutual information rate I(low, high) is computable…

Page 19: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Conclusion

Page 20: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Computability

• The mutual information rate between two sensors is computable for some computational models.• Nondeterministic pushdown automata

augmented with reversal-bounded counters• Discrete timed automata

Page 21: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Analysis

• The computed mutual information rate can be used to determine if there is no information flow between sensors.

• This provides a method to quantitatively and algorithmically analyze some types of covert channels.

Page 22: Security of Numerical Sensors in Finite Automata Zhe Dang Dmitry Dementyev Thomas R. Fischer William J. Hutton, III Washington State University – Pullman,

Thank [email protected]