16.04.2025
Privacy-preserving runtime verification
Abstract
Runtime verification offers scalable solutions to improve the safety and reliability of systems. However, systems that require verification or monitoring by a third party to ensure compliance with a specification might contain sensitive information, causing privacy concerns when usual runtime verification approaches are used. Privacy is compromised if protected information about the system, or sensitive data that is processed by the system, is revealed. In addition, revealing the specification being monitored may undermine the essence of third-party verification.
In this work, we propose a novel protocol for the privacy-preserving runtime verification of systems against formal sequential specifications, which ensures that the system remains oblivious to the monitored specification, while the monitor learns only whether the system satisfies the specification and nothing more. Our protocol adapts and improves existing techniques used in cryptography, and more specifically, two-party computation.
Bio
Mahyar is a PhD student at IST Austria, supervised by Tom Henzinger. His research focus is on the intersection of runtime verification and private computing; specifically, his work is on designing private schemes for runtime verification, using techniques from cryptography. Before starting his graduate studies, Mahyar got his BSc in computer engineering from the University of Tehran, in 2023.
More: https://mahykari.github.io
Photo provided by speaker
Runtime verification offers scalable solutions to improve the safety and reliability of systems. However, systems that require verification or monitoring by a third party to ensure compliance with a specification might contain sensitive information, causing privacy concerns when usual runtime verification approaches are used. Privacy is compromised if protected information about the system, or sensitive data that is processed by the system, is revealed. In addition, revealing the specification being monitored may undermine the essence of third-party verification.
In this work, we propose a novel protocol for the privacy-preserving runtime verification of systems against formal sequential specifications, which ensures that the system remains oblivious to the monitored specification, while the monitor learns only whether the system satisfies the specification and nothing more. Our protocol adapts and improves existing techniques used in cryptography, and more specifically, two-party computation.
Bio
Mahyar is a PhD student at IST Austria, supervised by Tom Henzinger. His research focus is on the intersection of runtime verification and private computing; specifically, his work is on designing private schemes for runtime verification, using techniques from cryptography. Before starting his graduate studies, Mahyar got his BSc in computer engineering from the University of Tehran, in 2023.
More: https://mahykari.github.io
Photo provided by speaker