Secure-by-construction synthesis of cyber-physical systems
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …
control theory towards designing safety-critical systems. Instead of following the time-tested …
Cybersecurity and supervisory control: A tutorial on robust state estimation, attack synthesis, and resilient control
This tutorial paper studies the effect of deception attacks on compromised sensors and
actuators at the supervisory control layer of cyber-physical control systems. The problem is …
actuators at the supervisory control layer of cyber-physical control systems. The problem is …
Synthesizing permissive winning strategy templates for parity games
We present a novel method to compute permissive winning strategies in two-player games
over finite graphs with ω-regular winning conditions. Given a game graph G and a parity …
over finite graphs with ω-regular winning conditions. Given a game graph G and a parity …
Environmentally-friendly GR (1) synthesis
Many problems in reactive synthesis are stated using two formulas—an environment
assumption and a system guarantee—and ask for an implementation that satisfies the …
assumption and a system guarantee—and ask for an implementation that satisfies the …
[PDF][PDF] Fast symbolic algorithms for omega-regular games under strong transition fairness
We consider xpoint algorithms for two-player games on graphs with 𝜔-regular winning
conditions, where the environment is constrained by a strong transition fairness assumption …
conditions, where the environment is constrained by a strong transition fairness assumption …
Contract-based distributed synthesis in two-objective parity games
We present a novel method to compute $\textit {assume-guarantee contracts} $ in non-
zerosum two-player games over finite graphs where each player has a different $\omega …
zerosum two-player games over finite graphs where each player has a different $\omega …
On-the-fly informed search of non-blocking directed controllers
We study directed control of discrete event system expressed as the parallel composition of
interacting automata. Solutions that first compose the automata and then compute a …
interacting automata. Solutions that first compose the automata and then compute a …
Towards a formal model of computation for RMAS
RMAS is a multi-agent system architecture and associated model of computation that has
been recently proposed as promising framework for autonomic computation and as viable …
been recently proposed as promising framework for autonomic computation and as viable …
A dynamic obfuscation framework for security and utility
A Wintenberg, M Blischke, S Lafortune… - 2022 ACM/IEEE 13th …, 2022 - ieeexplore.ieee.org
Obfuscation can be used by dynamic systems to ensure private and secure communication
over networks vulnerable to eavesdroppers. Balancing the utility of sending information to …
over networks vulnerable to eavesdroppers. Balancing the utility of sending information to …
On tolerance of discrete systems with respect to transition perturbations
Control systems should enforce a desired property for both expected/modeled situations as
well as unexpected/unmodeled environmental situations. Existing methods focus on …
well as unexpected/unmodeled environmental situations. Existing methods focus on …