Skip to main content

Time Insertion Functions

  • Conference paper
  • First Online:
Advances in Model and Data Engineering in the Digitalization Era (MEDI 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1481))

Included in the following conference series:

Abstract

Time insertion functions as a tool to guarantee security of processes with respect to timing attacks are discussed and studied. We work with a security property called opacity and we investigate how it can be enforced by such functions. The time insertion function can alter time behaviour of original system by inserting some time delays to guarantee its security. We investigate conditions under which such functions do exist and also some of their properties.

This work was supported by the Slovak Research and Development Agency under the Contract no. APVV-19-0220 (ORBIS) and by the Slovak VEGA agency under Contract no. 1/0778/18 (KATO).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bryans, J.W., Koutny, M., Mazaré, L., Ryan, P.Y.A.: Modelling non-deducibility using Petri Nets. In: Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (2004)

    Google Scholar 

  2. Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.): FAST 2005. LNCS, vol. 3866. Springer, Heidelberg (2006). https://doi.org/10.1007/11679219

  3. Focardi, R., Gorrieri, R., Martinelli, F.: Information flow analysis in a discrete-time process algebra. In: Proceedings of 13th Computer Security Foundation Workshop. IEEE Computer Society Press (2000)

    Google Scholar 

  4. Gorrieri, R., Martinelli, F.: A simple framework for real-time cryptographic protocol analysis with compositional proof rules. Sci. Comput. Program. 50(1–3), 23–49 (2004)

    Google Scholar 

  5. Goguen, J., Meseguer, J.: Security policies and security models. In: Proceedings of IEEE Symposium on Security and Privacy (1982)

    Google Scholar 

  6. Gruska D.P., Ruiz M.C.: Security testing for multi-agent systems. In: Rojas, I., Joya, G., Catala, A. (eds.) Advances in Computational Intelligence. IWANN 2019. Lecture Notes in Computer Science, vol 11506, pp. 703–715. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-20521-8_58

  7. Gruska, D.P.: Security and time insertion. In: PCI 2019. ACM (2019)

    Google Scholar 

  8. Gruska, D.P., Ruiz, M.C.: Opacity-enforcing for Process Algebras. In: CS&P 2018 (2018)

    Google Scholar 

  9. Voronkov, A., Virbitskaite, I. (eds.): PSI 2014. LNCS, vol. 8974. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46823-4

  10. Jacob, R., Lesage, J.-J., Faure, J.-M.: Overview of discrete event systems opacity: models, validation, and quantification. Ann. Rev. Control 41, 135–146 (2016)

    Google Scholar 

  11. Keroglou, C., Ricker, L., Lafortune, S.: Insertion functions with memory for opacity enforcement. IFAC-PapersOnLine 51(7), 394–399 (2018)

    Google Scholar 

  12. Keroglou, C., Lafortune, S.: Embedded insertion functions for opacity enforcement. IEEE Trans. Autom. Control. 66(9), 4184–4191 (2021). https://doi.org/10.1109/TAC.2020.3037891

    Article  MathSciNet  MATH  Google Scholar 

  13. Milner, R.: Communication and Concurrency. Prentice-Hall International, New York (1989)

    Google Scholar 

  14. Ramadge, P.J.G., Wonham, W.M.: The control of discrete event systems. Proc. IEEE 77(1), 81–98 (1989)

    Google Scholar 

  15. Wu, Y.-C., Lafortune, S.: Enforcement of opacity properties using insertion functions. In: Proceedings of 51st IEEE Conference on Decision and Control (CDC) (2012)

    Google Scholar 

  16. Ji, Y., Yin, X., Lafortune, S.: Enforcing opacity by insertion functions under multiple energy constraints. Automatica 108, 108476 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Damas P. Gruska .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gruska, D.P. (2021). Time Insertion Functions. In: Bellatreche, L., Chernishev, G., Corral, A., Ouchani, S., Vain, J. (eds) Advances in Model and Data Engineering in the Digitalization Era. MEDI 2021. Communications in Computer and Information Science, vol 1481. Springer, Cham. https://doi.org/10.1007/978-3-030-87657-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-87657-9_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-87656-2

  • Online ISBN: 978-3-030-87657-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics