RISC JKU
  • @inproceedings{RISC5098,
    author = {Wolfgang Schreiner and Temur Kutsia and Michael Krieger and Bashar Ahmad and Helmut Otto and Martin Rummerstorfer},
    title = {{Securing Device Communication by Predicate Logic Specifications}},
    booktitle = {{embedded world Conference 2015, February 24-26 2015, Nürnberg, Germany}},
    language = {english},
    abstract = {We present a novel approach to the runtime monitoring of network traffic where from a high-level specification of security properties an executable monitor is generated; this monitor observes the network traffic in real time for violation of the specified properties in order to report respectively prevent these violations. The specification formalism is purely based on the classical notions of predicate logic and set theory with the corresponding level of expressiveness; compared to other more restricted formalisms it has thus much stronger capabilities to describe properties of interest. Its high level of flexibility makes our approach also applicable to other problem areas and engineering domains such as process control where it is important to guarantee that sequences of events conform to a particular protocol.},
    pages = {--},
    publisher = {Design&Elektronik},
    address = {Haar, Germany},
    isbn_issn = {ISBN 978-3-645-50144-6},
    year = {2015},
    month = {February},
    editor = {Matthias Sturm et al.},
    refereed = {no},
    keywords = {runtime monitoring; network security; event streams; predicate logic},
    sponsor = {Supported by the Austrian Research Promotion Agency (FFG) in the frame of the BRIDGE program by the project 846003 “LogicGuard II”},
    length = {9}
    }