Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-031-21707-4_22guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Explanation by Automated Reasoning Using the Isabelle Infrastructure Framework

Published: 26 June 2022 Publication History

Abstract

In this paper, we propose the use of interactive theorem proving for explainable machine learning. After informally motivating our proposition, we illustrate it on the dedicated application of explaining security attacks using the Isabelle Infrastructure framework and its process of dependability engineering. This formal framework and process provides the logics for specification and modeling. Attacks on security of the system are explained by specification and proofs in the Isabelle Infrastructure framework. Existing case studies of dependability engineering in Isabelle are used as feasibility studies to illustrate how different aspects of explanations are covered by the Isabelle Infrastructure framework. Finally, we propose a research agenda on how first-class explanation integrated with automated reasoning will solve the problem.

References

[1]
Bender, G., Kot, L., Gehrke, J.: Explainable security for relational databases. In: Dyreson, C.E., Li, F., Özsu, M.T. (eds.) International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, 22–27 June, 2014, pp. 1411–1422. ACM (2014)
[2]
Cappelli, D.M., Moore, A.P., Trzeciak, R.F.: The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). SEI Series in Software Engineering. Addison-Wesley Professional, 1st edn., February 2012
[3]
CHIST-ERA. Success: Secure accessibility for the internet of things (2016). http://www.chistera.eu/projects/success
[4]
Kammüller F Formalizing probabilistic quantum security protocols in the isabelle infrastructure framework 2019 CiE Informal Presentation at Computability in Europe
[5]
Kammüller, F.: Formal models of human factors for security and privacy. In: 5th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2017. LNCS, vol. 10292, pp. 339–352. Springer (2017). Affiliated with HCII 2017
[6]
Kammüller F Nicholson D Human centric security and privacy for the IoT using formal techniques Advances in Human Factors in Cybersecurity 2018 Cham Springer 106-116
[7]
Kammüller F Garcia-Alfaro J, Navarro-Arribas G, Hartenstein H, and Herrera-Joancomartí J A proof calculus for attack trees in isabelle Data Privacy Management, Cryptocurrencies and Blockchain Technology 2017 Cham Springer 3-18
[8]
Kammüller F Naccache D, Xu S, Qing S, Samarati P, Blanc G, Lu R, Zhang Z, and Meddahi A Attack trees in isabelle Information and Communications Security 2018 Cham Springer 611-628
[9]
Kammüller, F.: Formal modeling and analysis of data protection for gdpr compliance of iot healthcare systems. In: IEEE Systems, Man and Cybernetics, SMC2018. IEEE (2018)
[10]
Kammüller, F.: Attack trees in isabelle extended with probabilities for quantum cryptography. Comput. Secur. 87 (2019)
[11]
Kammüller, F.: Combining secure system design with risk assessment for iot healthcare systems. In: Workshop on Security, Privacy, and Trust in the IoT, SPTIoT’ 209, colocated with IEEE PerCom. IEEE (2019)
[12]
Kammüller, F.: Qkd in isabelle - bayesian calculation. arXiv, cs.CR (2019)
[13]
Kammüller, F.: Dependability engineering in isabelle (2021). arxiv preprint arxiv.org/abs/2112.04374
[14]
Kammüller, F., Alvarado, C.M.: Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders (2021). arxiv preprint arxiv.org/abs/2111.15425
[15]
Kammüller, F., Kerber, M.: Investigating airplane safety and security against insider threats using logical modeling. In: IEEE Security and Privacy Workshops, Workshop on Research in Insider Threats, WRIT 2016. IEEE (2016)
[16]
Kammüller, F., Kerber, M.: Applying the isabelle insider framework to airplane security. Sci. Comput. Programm. 206 (2021)
[17]
Kammüller, F., Kerber, M., Probst, C.: Towards formal analysis of insider threats for auctions. In: 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2016. ACM (2016)
[18]
Kammüller, F., Kerber, M., Probst, C.: Insider threats for auctions: formal modeling, proof, and certified code. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (JoWUA) 8(1) (2017)
[19]
Kammüller F and Lutz B Garcia-Alfaro J, Navarro-Arribas G, and Herrera-Joancomarti J Modeling and analyzing the corona-virus warning app with the Isabelle infrastructure framework Data Privacy Management, Cryptocurrencies and Blockchain Technology 2020 Cham Springer 128-144
[20]
Kammüller, F., Probst, C.W.: Invalidating policies using structural information. In: IEEE Security and Privacy Workshops, Workshop on Research in Insider Threats, WRIT 2013 (2013)
[21]
Kammüller, F., Probst, C.W.: Combining generated data models with formal invalidation for insider threat analysis. In: IEEE Security Privacy Workshops, Workshop on Research in Insider Threats, WRIT 2014 (2014)
[22]
Kammüller, F., Probst, C.W.: Modeling and verification of insider threats using logical analysis. IEEE Syst. J. Spec. Issue Insider Threats Inf. Secur. Digital Espionage Counter Intell. 11(2), 534–545 (2017)
[23]
Kammüller, F.: A formal development cycle for security engineering in Isabelle (2020). arxiv preprint. arxiv.org/abs/2001.08983
[24]
Nipkow T, Wenzel M, and Paulson LC Isabelle/HOL – A Proof Assistant forHigher-Order Logic 2002 Heidelberg Springer
[25]
Paulson LC The inductive approach to verifying cryptographic protocols J. Comput. Secur. 1998 6 1–2 85-128
[26]
Pieters W Explanation and trust: what to tell the user in security and AI? Ethics Inf. Technol. 2011 13 1 53-64
[27]
Viganó, L., Magazzeni, D.: Explainable security. EuroS &PW. In: IEEE European Symposium on Security and Privacy Workshops. IEEE (2020)
[28]
Windridge D and Kammüller F Arai K and Bhatia R Edit distance kernelization of np theorem proving for polynomial-time machine learning of proof heuristics Advances in Information and Communication 2020 Cham Springer 271-283

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
HCI International 2022 – Late Breaking Papers: Interacting with eXtended Reality and Artificial Intelligence: 24th International Conference on Human-Computer Interaction, HCII 2022, Virtual Event, June 26 – July 1, 2022, Proceedings
Jun 2022
629 pages
ISBN:978-3-031-21706-7
DOI:10.1007/978-3-031-21707-4
  • Editors:
  • Jessie Y. C. Chen,
  • Gino Fragomeni,
  • Helmut Degen,
  • Stavroula Ntoa

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 26 June 2022

Author Tags

  1. Explainable AI
  2. Automated reasoning
  3. Dependability engineering
  4. First class representation of attack trees
  5. Isabelle infrastrucure framework

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media