There is a newer version of the record available.

Published May 6, 2022 | Version v1
Other Open

Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption

  • 1. Kyoto University
  • 2. Beihang University

Description

In this paper, we proposed two algorithms (Reverse and Block) to conduct online monitoring against a safety LTL specification via fully homomorphic encryption. We implemented these two algorithms in C++20 and experimentally answered two research questions (RQ1 and RQ2) we posed.

This artifact includes a Docker image including our C++20 programs and some scripts for the experiments to replicate our experimental results shown in the paper. It measures execution runtimes to generate monitored ciphertexts, execute our proposed algorithms using the inputs, and decrypt the result. It also has a functionality named plaintext mode, and one can check if the decrypted result is the same as the one executed in plaintext.

We note that the runtimes we presented in the paper were obtained on a workstation, and they will differ from the ones on a laptop. In this artifact, we also show the runtimes obtained on our laptop for reference.

System requirements to execute this artifact are as follows:

  • CPU: 2 cores and 4 threads or more. It must support AVX2 and AES-NI, i.e., it must be Intel Core i 5000 series or newer, or AMD Ryzen 1000 series or newer.
  • RAM: 4GiB or more
  • Disk: 10GiB or more of free space
  • Misc: Docker must be installed.

Files

homfa_cav22.zip

Files (387.9 MB)

Name Size Download all
md5:90610a4e2d1c74fcf1d294bc208e410c
387.9 MB Preview Download