ACKNOWLEDGMENTS
Part of this work was done during the visits to the University
of Pennsylvania by Alturki, Ban Kirigin, Kanovich, Nigam,
and Talcott, which were partially supported by ONR grant
N00014-15-1-2047 and by the University of Pennsylva-
nia. Ban Kirigin is supported in part by the Croatian Sci-
ence Foundation under the project UIP-05-2017-9219. The
work of Max Kanovich was partially supported by EP-
SRC Programme Grant EP/R006865/1: “Interface Reason-
ing for Interacting Systems (IRIS).” Nigam is partially sup-
ported by NRL grant N0017317-1-G002, and CNPq grant
303909/2018-8. Scedrov is partially supported by ONR
grants N00014-20-1-2635 and N00014-18-1-2618. Tal-
cott was partially supported by ONR grants N00014-15-1-
2202 and N00014-20-1-2644, and NRL grant N0017317-1-
G002.
REFERENCES
Ademaj et al. (2019). Time sensitive networks for flexible
manufacturing testbed - description of converged traf-
fic types, IIC white paper.
AlTurki, M. A., Kanovich, M., Ban Kirigin, T., Nigam,
V., Scedrov, A., and Talcott, C. (2018). Statisti-
cal model checking of distance fraud attacks on the
Hancke-Kuhn family of protocols. In Proceedings of
the 2018 Workshop on Cyber-Physical Systems Secu-
rity and PrivaCy, pages 60–71. ACM.
Biere, A., Cimatti, A., Clarke, E. M., Strichman, O., and
Zhu, Y. (2003). Bounded model checking. Advances
in Computers, 58:117–148.
Cyberattack Has Caused Confirmed Physical Dam-
age for the Second Time Ever. (2015).
Available at https://www.wired.com/2015/01/
german-steel-mill-hack-destruction/.
Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet,
N., Meseguer, J., and Talcott, C. (2007). All About
Maude: A High-Performance Logical Framework,
volume 4350 of LNCS. Springer.
Dolev, D. and Yao, A. (1983). On the security of public key
protocols. IEEE Transactions on Information Theory,
29(2):198–208.
Durgin, N. A., Lincoln, P., Mitchell, J. C., and Scedrov,
A. (2004). Multiset rewriting and the complexity of
bounded security protocols. Journal of Computer Se-
curity, 12(2):247–311.
ENISA (2018). Good practices for security of internet of
things in the context of smart manufacturing.
Fiat, M. and et.al. (2017). OPC UA security analysis.
Kanovich, M., Ban Kirigin, T., Nigam, V., and Scedrov, A.
(2013). Bounded memory protocols and progressing
collaborative systems. In ESORICS, pages 309–326.
Kanovich, M. I., Ban Kirigin, T., Nigam, V., and Scedrov,
A. (2014). Bounded memory Dolev-Yao adversaries
in collaborative systems. Inf. Comput., 238:233–261.
Kanovich, M. I., Ban Kirigin, T., Nigam, V., Scedrov, A.,
and Talcott, C. L. (2017). Time, computational com-
plexity, and probability in the analysis of distance-
bounding protocols. Journal of Computer Security,
25(6):585–630.
Kanovich, M. I., Rowe, P., and Scedrov, A. (2011). Col-
laborative planning with confidentiality. Journal of
Automated Reasoning, 46(3-4):389–421.
Lanotte, R., Merro, M., Munteanu, A., and Viganò, L.
(2020). A formal approach to physics-based attacks
in cyber-physical systems. ACM Trans. Priv. Secur.,
23(1).
Nigam, V. and Talcott, C. (2019). Formal security verifi-
cation of industry 4.0 applications. In ETFA, Special
Track on Cybersecurity in Industrial Control Systems.
Nigam, V. and Talcott, C. (2020). Automated construction
of security integrity wrappers for industry 4.0 applica-
tions. In International Workshop on Rewriting Logic
and its Applications (WRLA).
Savage, J.E.(1998). Models of computation. Addison-
Wesley Reading, MA
Urquiza, A. A., AlTurki, M. A., Kanovich, M., Ban Kirigin,
T., Nigam, V., Scedrov, A., and Talcott, C. (2019).
Resource-bounded intruders in denial of service at-
tacks. In 32nd Computer Security Foundations Sym-
posium (CSF), pages 382–396. IEEE.
Yoong, L. H., Roop, P. S., Bhatti, Z. E., and Kupz, M. M. Y.
(2015). Model-Driven Design Using IEC 61499:
A Synchronous Approach for Embedded Automation
Systems. Springer.
Zoitl, A. and Lewis, R. (2014). Modelling control systems
using IEC 61499. Control Engineering Series 95. The
Institution of Electrical Engineers, London.
APPENDIX
PSPACE-hardness in Theorem 4.12
Theorem 4.12. FCP for PAS is PSPACE-hard.
Remark 7.1. For the sake of readability, here, and
henceforth, we will abbreviate Eq.(1) as:
q,R
B
1
,A
(m
1
),..,R
B
k
,A
(m
k
) → q
0
,R
A,C
1
(m
0
1
),..,R
A,C
`
(m
0
`
)
(5)
The PSPACE decision problem can be defined as:
“Given a Turing machine M running in space m,
determine whether there is a binary string x of
length m so that x is accepted by M.”
We reformulate the problem in terms of
e
M, which
deals only with one and the same initial configuration
fixed in advance.
Lemma 7.2. Given a deterministic Turing machine M
running, say, in space m = n/3, we construct a deter-
ministic Turing machine
e
M running in space n so that
for its fixed initial tape of the form
n times
z}|{
aa..a and its initial
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
52