Securing Device Communication by Predicate Logic Specifications

Research output: Chapter in Book/Report/Conference proceedingConference proceedings

Abstract

We present a novel approach to the runtime monitoring of network traffic where from a high-level specification of security properties an executable monitor is generated; this monitor observes the network traffic in real time for violation of the specified properties in order to report respectively prevent these violations. The specification formalism is purely based on the classical notions of predicate logic and set theory with the corresponding level of expressiveness; compared to other more restricted formalisms it has thus much stronger capabilities to describe properties of interest. Its high level of flexibility makes our approach also applicable to other problem areas and engineering domains such as process control where it is important to guarantee that sequences of events conform to a particular protocol.
Original languageEnglish
Title of host publicationEmbedded world Conference 2015, February 24-26 2015, Nürnberg, Germany
Editors Matthias Sturm et al.
Place of PublicationHaar, Germany
PublisherDesign & Elektronik
Number of pages9
ISBN (Print)978-3-645-50144-6
Publication statusPublished - Feb 2015

Fields of science

  • 101 Mathematics
  • 101001 Algebra
  • 101005 Computer algebra
  • 101009 Geometry
  • 101012 Combinatorics
  • 101013 Mathematical logic
  • 101020 Technical mathematics

JKU Focus areas

  • Computation in Informatics and Mathematics

Cite this