Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption
Authors/Creators
- 1. Kyoto University
- 2. Beihang University
Description
In this paper, we proposed two algorithms (Reverse and Block) to conduct online monitoring against a safety LTL specification via fully homomorphic encryption. We implemented these two algorithms in C++20 and experimentally answered two research questions (RQ1 and RQ2) we posed.
This artifact includes a Docker image including our C++20 programs and some scripts for the experiments to replicate our experimental results shown in the paper. It measures execution runtimes to generate monitored ciphertexts, execute our proposed algorithms using the inputs, and decrypt the result. It also has a functionality named plaintext mode, and one can check if the decrypted result is the same as the one executed in plaintext.
We note that the runtimes we presented in the paper were obtained on a workstation, and they will differ from the ones on a laptop. In this artifact, we also show the runtimes obtained on our laptop for reference.
System requirements to execute this artifact are as follows:
- CPU: 2 cores and 4 threads or more. It must support AVX2 and AES-NI, i.e., it must be Intel Core i 5000 series or newer, or AMD Ryzen 1000 series or newer.
- RAM: 4GiB or more
- Disk: 10GiB or more of free space
- Misc: Docker must be installed.
Files
homfa_cav22.zip
Files
(387.9 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:90610a4e2d1c74fcf1d294bc208e410c
|
387.9 MB | Preview Download |