Skip to main content

Showing 1–22 of 22 results for author: Talcott, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.13295  [pdf, ps, other

    cs.CR

    Dialects for CoAP-like Messaging Protocols

    Authors: Carolyn Talcott

    Abstract: Messaging protocols for resource limited systems such as distributed IoT systems are often vulnerable to attacks due to security choices made to conserve resources such as time, memory, or bandwidth. For example, use of secure layers such as DTLS are resource expensive and can sometimes cause service disruption. Protocol dialects are intended as a light weight, modular mechanism to provide selecte… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: 63 pages

    ACM Class: I.6.4

  2. arXiv:2401.05585  [pdf, ps, other

    cs.LO

    Technical Report: Time-Bounded Resilience

    Authors: Tajana Ban Kirigin, Jesse Comer, Max Kanovich, Andre Scedrov, Carolyn Talcott

    Abstract: Most research on formal system design has focused on optimizing various measures of efficiency. However, insufficient attention has been given to the design of systems optimizing resilience, the ability of systems to adapt to unexpected changes or adversarial disruptions. In our prior work, we formalized the intuitive notion of resilience as a property of cyber-physical systems by using a multiset… ▽ More

    Submitted 2 June, 2024; v1 submitted 10 January, 2024; originally announced January 2024.

  3. arXiv:2304.11564  [pdf, other

    cs.LO cs.SE

    Technical-Report: Automating Recoverability Proofs for Cyber-Physical Systems with Runtime Assurance Architectures

    Authors: Vivek Nigam, Carolyn Talcott

    Abstract: Cyber-physical systems (CPSes), such as autonomous vehicles, use sophisticated components like ML-based controllers. It is difficult to provide evidence about the safe functioning of such components. To overcome this problem, Runtime Assurance Architecture (RTA) solutions have been proposed. The \RAP's decision component evaluates the system's safety risk and whenever the risk is higher than accep… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

  4. arXiv:2207.01048  [pdf, ps, other

    cs.LO

    A Formal Framework for Distributed Cyber-Physical Systems

    Authors: Benjamin Lion, Farhad Arbab, Carolyn Talcott

    Abstract: Composition is an important feature of a specification language, as it enables the design of a complex system in terms of a product of its parts. Decomposition is equally important in order to reason about structural properties of a system. Usually, however, a system can be decomposed in more than one way, each optimizing for a different set of criteria. We extend an algebraic component-based mode… ▽ More

    Submitted 3 July, 2022; originally announced July 2022.

  5. arXiv:2206.03997  [pdf, ps, other

    cs.LO

    A Rewriting Framework for Interacting Cyber-Physical Agents

    Authors: Benjamin Lion, Farhad Arbab, Carolyn Talcott

    Abstract: The analysis of cyber-physical systems (CPS) is challenging due to the large state space and the continuous changes occurring in their constituent parts. Design practices favor modularity to help reducing this complexity. In a previous work, we proposed a discrete semantic model for CPS that captures both cyber and physical aspects as streams of discrete observations, which ultimately form the beh… ▽ More

    Submitted 2 August, 2022; v1 submitted 8 June, 2022; originally announced June 2022.

  6. arXiv:2205.13008  [pdf, ps, other

    cs.LO cs.FL

    Runtime Composition Of Systems of Interacting Cyber-Physical Components

    Authors: Benjamin Lion, Farhad Arbab, Carolyn Talcott

    Abstract: We introduce a transition system based specification of cyber-physical systems whose semantics is compositional with respect to a family of algebraic products. We give sufficient conditions for execution of a product to be correctly implemented by a lazy expansion of the product construction. The transition system algebra is implemented in the Maude rewriting logic system, and we report a simple c… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

  7. A Semantic Model for Interacting Cyber-Physical Systems

    Authors: Benjamin Lion, Farhad Arbab, Carolyn Talcott

    Abstract: We propose a component-based semantic model for Cyber-Physical Systems (CPSs) wherein the notion of a component abstracts the internal details of both cyber and physical processes, to expose a uniform semantic model of their externally observable behaviors expressed as sets of sequences of observations. We introduce algebraic operations on such sequences to model different kinds of component compo… ▽ More

    Submitted 1 October, 2021; originally announced October 2021.

    Comments: In Proceedings ICE 2021, arXiv:2109.14908. A technical report belonging to this paper, containing all proofs, appears at arXiv:2106.15661

    Report number: EPTCS 347-5

    Journal ref: EPTCS 347, 2021, pp. 77-95

  8. arXiv:2106.09802  [pdf, other

    cs.CR

    Intentional Forgetting

    Authors: Deborah Shands, Carolyn Talcott

    Abstract: Many damaging cybersecurity attacks are enabled when an attacker can access residual sensitive information (e.g. cryptographic keys, personal identifiers) left behind from earlier computation. Attackers can sometimes use residual information to take control of a system, impersonate a user, or manipulate data. Current approaches to addressing access to residual sensitive information aim to patch in… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

  9. arXiv:2105.03531  [pdf, other

    cs.CC cs.LO

    On the Complexity of Verification of Time-Sensitive Distributed Systems: Technical Report

    Authors: Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott

    Abstract: This paper develops a Multiset Rewriting language with explicit time for the specification and analysis of Time-Sensitive Distributed Systems (TSDS). Goals are often specified using explicit time constraints. A good trace is an infinite trace in which the goals are satisfied perpetually despite possible interference from the environment. In our previous work (FORMATS 2016), we discussed two desira… ▽ More

    Submitted 14 September, 2021; v1 submitted 7 May, 2021; originally announced May 2021.

    Comments: This Technical Report updates and subsumes the technical report arXiv:1606.07886. arXiv admin note: text overlap with arXiv:1606.07886

  10. Programming and Symbolic Computation in Maude

    Authors: Francisco Durán, Steven Eker, Santiago Escobar, Narciso Martí-Oliet, José Meseguer, Rubén Rubio, Carolyn Talcott

    Abstract: Rewriting logic is both a flexible semantic framework within which widely different concurrent systems can be naturally specified and a logical framework in which widely different logics can be specified. Maude programs are exactly rewrite theories. Maude has also a formal environment of verification tools. Symbolic computation is a powerful technique for reasoning about the correctness of concurr… ▽ More

    Submitted 18 October, 2019; originally announced October 2019.

    Comments: Journal of Logical and Algebraic Methods in Programming, 2019

  11. arXiv:1908.03841  [pdf, other

    q-bio.GN cs.LG q-bio.CB stat.ML

    Transcriptional Response of SK-N-AS Cells to Methamidophos

    Authors: Akos Vertes, Albert-Baskar Arul, Peter Avar, Andrew R. Korte, Lida Parvin, Ziad J. Sahab, Deborah I. Bunin, Merrill Knapp, Denise Nishita, Andrew Poggio, Mark-Oliver Stehr, Carolyn L. Talcott, Brian M. Davis, Christine A. Morton, Christopher J. Sevinsky, Maria I. Zavodszky

    Abstract: Transcriptomics response of SK-N-AS cells to methamidophos (an acetylcholine esterase inhibitor) exposure was measured at 10 time points between 0.5 and 48 h. The data was analyzed using a combination of traditional statistical methods and novel machine learning algorithms for detecting anomalous behavior and infer causal relations between time profiles. We identified several processes that appear… ▽ More

    Submitted 10 August, 2019; originally announced August 2019.

  12. arXiv:1907.11321  [pdf, other

    cs.AI cs.LG cs.LO q-bio.CB

    Probabilistic Approximate Logic and its Implementation in the Logical Imagination Engine

    Authors: Mark-Oliver Stehr, Minyoung Kim, Carolyn L. Talcott, Merrill Knapp, Akos Vertes

    Abstract: In spite of the rapidly increasing number of applications of machine learning in various domains, a principled and systematic approach to the incorporation of domain knowledge in the engineering process is still lacking and ad hoc solutions that are difficult to validate are still the norm in practice, which is of growing concern not only in mission-critical applications. In this note, we introd… ▽ More

    Submitted 25 July, 2019; originally announced July 2019.

  13. arXiv:1905.02291  [pdf, other

    cs.LG q-bio.CB stat.ML

    Learning Causality: Synthesis of Large-Scale Causal Networks from High-Dimensional Time Series Data

    Authors: Mark-Oliver Stehr, Peter Avar, Andrew R. Korte, Lida Parvin, Ziad J. Sahab, Deborah I. Bunin, Merrill Knapp, Denise Nishita, Andrew Poggio, Carolyn L. Talcott, Brian M. Davis, Christine A. Morton, Christopher J. Sevinsky, Maria I. Zavodszky, Akos Vertes

    Abstract: There is an abundance of complex dynamic systems that are critical to our daily lives and our society but that are hardly understood, and even with today's possibilities to sense and collect large amounts of experimental data, they are so complex and continuously evolving that it is unlikely that their dynamics will ever be understood in full detail. Nevertheless, through computational tools we ca… ▽ More

    Submitted 6 May, 2019; originally announced May 2019.

  14. arXiv:1811.04826  [pdf, other

    cs.CC cs.LO

    Compliance in Real Time Multiset Rewriting Models

    Authors: Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott

    Abstract: The notion of compliance in Multiset Rewriting Models (MSR) has been introduced for untimed models and for models with discrete time. In this paper we revisit the notion of compliance and adapt it to fit with additional nondeterminism specific for dense time domains. Existing MSR with dense time are extended with critical configurations and non-critical traces, that is, traces involving no critica… ▽ More

    Submitted 12 November, 2018; originally announced November 2018.

  15. Reasoning about effects: from lists to cyber-physical agents

    Authors: Ian A. Mason, Carolyn L. Talcott

    Abstract: Theories for reasoning about programs with effects initially focused on basic manipulation of lists and other mutable data. The next challenge was to consider higher-order programming, adding functions as first class objects to mutable data. Reasoning about actors added the challenge of dealing with distributed open systems of entities interacting asynchronously. The advent of cyber-physical agent… ▽ More

    Submitted 29 April, 2019; v1 submitted 24 January, 2018; originally announced January 2018.

    Journal ref: Logical Methods in Computer Science, Volume 15, Issue 2 (April 30, 2019) lmcs:4239

  16. arXiv:1801.04066  [pdf, other

    cs.LO

    Symbolic Timed Observational Equivalence

    Authors: Vivek Nigam, Carolyn Talcott, Abrãao Aires Urquiza

    Abstract: Intruders can infer properties of a system by measuring the time it takes for the system to respond to some request of a given protocol, that is, by exploiting time side channels. These properties may help intruders distinguish whether a system is a honeypot or concrete system hel** him avoid defense mechanisms, or track a user among others violating his privacy. Observational equivalence is the… ▽ More

    Submitted 17 December, 2018; v1 submitted 12 January, 2018; originally announced January 2018.

    Comments: New version with corrected Typos, improved motivation, explanation, better notation

  17. A Component-oriented Framework for Autonomous Agents

    Authors: Tobias Kappé, Farhad Arbab, Carolyn Talcott

    Abstract: The design of a complex system warrants a compositional methodology, i.e., composing simple components to obtain a larger system that exhibits their collective behavior in a meaningful way. We propose an automaton-based paradigm for compositional design of such systems where an action is accompanied by one or more preferences. At run-time, these preferences provide a natural fallback mechanism for… ▽ More

    Submitted 31 July, 2017; originally announced August 2017.

    Journal ref: Proc. FACS 2017, pp 20-38

  18. Time, Computational Complexity, and Probability in the Analysis of Distance-Bounding Protocols

    Authors: Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott

    Abstract: Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as Cyber-Physical. Time plays a key role in design and… ▽ More

    Submitted 4 October, 2017; v1 submitted 12 February, 2017; originally announced February 2017.

    Comments: Extending our POST 2015 paper

  19. A Compositional Framework for Preference-Aware Agents

    Authors: Tobias Kappé, Farhad Arbab, Carolyn Talcott

    Abstract: A formal description of a Cyber-Physical system should include a rigorous specification of the computational and physical components involved, as well as their interaction. Such a description, thus, lends itself to a compositional model where every module in the model specifies the behavior of a (computational or physical) component or the interaction between different components. We propose a fra… ▽ More

    Submitted 15 December, 2016; originally announced December 2016.

    Comments: In Proceedings V2CPS-16, arXiv:1612.04023

    Journal ref: EPTCS 232, 2016, pp. 21-35

  20. arXiv:1606.07886  [pdf, other

    cs.LO

    Timed Multiset Rewriting and the Verification of Time-Sensitive Distributed Systems

    Authors: Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott

    Abstract: Time-Sensitive Distributed Systems (TSDS), such as applications using autonomous drones, achieve goals under possible environment interference (\eg, winds). Moreover, goals are often specified using explicit time constraints which must be satisfied by the system \emph{perpetually}. For example, drones carrying out the surveillance of some area must always have \emph{recent pictures}, \ie, at most… ▽ More

    Submitted 2 July, 2024; v1 submitted 25 June, 2016; originally announced June 2016.

    Comments: Updated version with corrected proofs

  21. arXiv:1605.08563  [pdf, other

    cs.CR cs.LO

    Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders

    Authors: Vivek Nigam, Carolyn Talcott, Abraão Aires Urquiza

    Abstract: Timed Intruder Models have been proposed for the verification of Cyber-Physical Security Protocols (CPSP) amending the traditional Dolev-Yao intruder to obey the physical restrictions of the environment. Since to learn a message, a Timed Intruder needs to wait for a message to arrive, mounting an attack may depend on where Timed Intruders are. It may well be the case that in the presence of a grea… ▽ More

    Submitted 27 May, 2016; originally announced May 2016.

    Comments: 19 pages

    MSC Class: 68Q60

  22. arXiv:1309.5145  [pdf, other

    cs.CE q-bio.OT

    The Immune System: the ultimate fractionated cyber-physical system

    Authors: Carolyn Talcott

    Abstract: In this little vision paper we analyze the human immune system from a computer science point of view with the aim of understanding the architecture and features that allow robust, effective behavior to emerge from local sensing and actions. We then recall the notion of fractionated cyber-physical systems, and compare and contrast this to the immune system. We conclude with some challenges.

    Submitted 19 September, 2013; originally announced September 2013.

    Comments: In Proceedings Festschrift for Dave Schmidt, arXiv:1309.4557

    Journal ref: EPTCS 129, 2013, pp. 309-324