Stratified guarded first-order transition systems

被引:1
作者
Mueller, Christian [1 ]
Seidl, Helmut [1 ]
机构
[1] Tech Univ Munich, Fak Informat, Boltzmannstr 3, D-45748 Garching, Germany
基金
美国国家科学基金会;
关键词
First-order transition systems; Multi-agent systems; Universal invariants; Noninterference; Decidability;
D O I
10.1007/s10703-022-00404-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
First-order transition systems are a convenient formalism to specify parametric systems such as multi-agent workflows or distributed algorithms. In general, any nontrivial question about such systems is undecidable. Here, we present three subclasses of first-order transition systems where every universal invariant can effectively be decided via fixpoint iteration. These subclasses are defined in terms of syntactical restrictions: negation, stratification and guardedness. While guardedness represents a particular pattern how input predicates control existential quantifiers, stratification limits the information flow between predicates. Guardedness implies that the weakest precondition for every universal invariant is again universal, while the remaining sufficient criteria enforce that either the number of occurring negated literals decreases in every iteration, or the number of required instances of input predicates or the number of first-order variables remains bounded. We argue for each of these three cases that termination of the fixpoint iteration can be guaranteed. We apply these results to identify classes of multi-agent systems, when formalized as first-order transition systems, where noninterference in presence of declassification is decidable for coalitions of attackers of bounded size.
引用
收藏
页码:39 / 69
页数:31
相关论文
共 28 条
[1]   Testings on the elimination problem of the mathematical logic. [J].
Ackermann, W .
MATHEMATISCHE ANNALEN, 1935, 110 :390-414
[2]  
B?rger E., 1997, CLASSICAL DECISION P, DOI [10.1007/978-3-642-59207-2, DOI 10.1007/978-3-642-59207-2]
[3]  
Ball T, 2014, ACM SIGPLAN NOTICES, V49, P282, DOI [10.1145/2594291.2594317, 10.1145/2666356.2594317]
[4]   Product programs and relational program logics [J].
Barthe, Gilles ;
Crespo, Juan Manuel ;
Kunz, Cesar .
JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2016, 85 (05) :847-859
[5]   Verification of Threshold-Based Distributed Algorithms by Decomposition to Decidable Logics [J].
Berkovits, Idan ;
Lazic, Marijana ;
Losa, Giuliano ;
Padon, Oded ;
Shoham, Sharon .
COMPUTER AIDED VERIFICATION, CAV 2019, PT II, 2019, 11562 :245-266
[6]  
Borger E, 2003, ABSTRACT STATE MACHI, P343, DOI [10.1007/978-3-642-18216-7_9, DOI 10.1007/978-3-642-18216-7_9]
[7]   Hyperproperties [J].
Clarkson, Michael ;
Schneider, Fred .
JOURNAL OF COMPUTER SECURITY, 2010, 18 (06) :1157-1210
[8]   Z3: An efficient SMT solver [J].
de Moura, Leonardo ;
Bjorner, Nikolaj .
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 :337-340
[9]   BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS [J].
Feldman, Yotam M. Y. ;
Padon, Oded ;
Immerman, Neil ;
Sagiv, Mooly ;
Shoham, Sharon .
LOGICAL METHODS IN COMPUTER SCIENCE, 2019, 15 (03)
[10]   Verifying Security Policies in Multi-agent Workflows with Loops [J].
Finkbeiner, Bernd ;
Mueller, Christian ;
Seidl, Helmut ;
Zalinescu, Eugen .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :633-645