kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Publications (10 of 56) Show all publications
Kamboj, P., Artho, C., Guanciale, R., Jabbarvand, R. & Godfrey, B. (2025). Leveraging Petri Nets for Workflow Anomaly Detection in Microservice Architectures. In: Application and Theory of Petri Nets and Concurrency - 46th International Conference, PETRI NETS 2025, Proceedings: . Paper presented at 46th International Conference on Applications and Theory of Petri Nets and Concurrency, PETRI NETS 2025, Paris, France, Jun 22 2025 - Jun 27 2025 (pp. 219-241). Springer Nature
Open this publication in new window or tab >>Leveraging Petri Nets for Workflow Anomaly Detection in Microservice Architectures
Show others...
2025 (English)In: Application and Theory of Petri Nets and Concurrency - 46th International Conference, PETRI NETS 2025, Proceedings, Springer Nature , 2025, p. 219-241Conference paper, Published paper (Refereed)
Abstract [en]

Modern microservice architectures pose challenges in understanding and managing the complex workflows within these decentralized services. In particular, it is difficult to identify anomalous behavior that could indicate a bug or attack. We use traces of microservice application activity (requests and responses) to infer a model of the application’s normal behavior. Our approach mines Petri nets to formally represent concurrent operations and their temporal dependencies with a targeted delay injection approach that accurately and efficiently learns these dependencies. The models produced are both explainable and easy to inspect, which offers more transparency and control. Our evaluation shows that injecting delays during model training allows us to achieve perfect model and log fitness (Move-Model and Move-Log fitness of 1) with just 29 traces. In contrast, a straightforward approach requires over 10,000 traces to achieve similar accuracy. Our models successfully identify anomalies in various experiments, such as traces with one missing or multiple missing activities, and reordered sequences to simulate issues in real-world scenarios. Our approach outperforms the state-of-the-art method, demonstrating higher accuracy.

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
Alignments, Conformance Checking, Cost function, Delay, Microservices, Process discovery, Process mining
National Category
Computer Sciences Computer Systems Robotics and automation
Identifiers
urn:nbn:se:kth:diva-368632 (URN)10.1007/978-3-031-94634-9_11 (DOI)2-s2.0-105008762714 (Scopus ID)
Conference
46th International Conference on Applications and Theory of Petri Nets and Concurrency, PETRI NETS 2025, Paris, France, Jun 22 2025 - Jun 27 2025
Note

Part of ISBN 9783031946332

QC 20250819

Available from: 2025-08-19 Created: 2025-08-19 Last updated: 2025-08-19Bibliographically approved
Lundberg, D., Guanciale, R. & Dam, M. (2025). Proof-Producing Symbolic Execution for P4. In: Verified Software. Theories, Tools and Experiments - 16th International Conference, VSTTE 2024, Revised Selected Papers: . Paper presented at 16th International Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2024, Prague, Czechia, October 14-15, 2024 (pp. 70-83). Springer Nature
Open this publication in new window or tab >>Proof-Producing Symbolic Execution for P4
2025 (English)In: Verified Software. Theories, Tools and Experiments - 16th International Conference, VSTTE 2024, Revised Selected Papers, Springer Nature , 2025, p. 70-83Conference paper, Published paper (Refereed)
Abstract [en]

We introduce a proof-producing symbolic execution tool for formal verification of P4 programs. The tool has been implemented using the interactive theorem prover HOL4 and results are proved sound with respect to the HOL4P4 formalisation of the P4 language. Most notably, this is a general tool for proving functional correctness that can be applied to entire real-world P4 programs.

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
Domain-Specific Languages, Formal Verification, Theorem Proving
National Category
Computer Sciences Computer Systems Embedded Systems
Identifiers
urn:nbn:se:kth:diva-363992 (URN)10.1007/978-3-031-86695-1_5 (DOI)001541342700005 ()2-s2.0-105005252570 (Scopus ID)
Conference
16th International Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2024, Prague, Czechia, October 14-15, 2024
Note

Part of ISBN 9783031866944

QC 20251021

Available from: 2025-06-02 Created: 2025-06-02 Last updated: 2025-11-12Bibliographically approved
Alshnakat, A., Ahmadian, A. M., Balliu, M., Guanciale, R. & Dam, M. (2025). Securing P4 Programs by Information Flow Control. In: Proceedings - 2025 IEEE 38th Computer Security Foundations Symposium, CSF 2025: . Paper presented at 38th IEEE Computer Security Foundations Symposium, CSF 2025, Santa Cruz, United States of America, June 16-20, 2025 (pp. 284-299). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Securing P4 Programs by Information Flow Control
Show others...
2025 (English)In: Proceedings - 2025 IEEE 38th Computer Security Foundations Symposium, CSF 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 284-299Conference paper, Published paper (Refereed)
Abstract [en]

Software-Defined Networking (SDN) has transformed network architectures by decoupling the control and data-planes, enabling fine-grained control over packet processing and forwarding. P4, a language designed for programming data-plane devices, allows developers to define custom packet processing behaviors directly on programmable network devices. This provides greater control over packet forwarding, inspection, and modification. However, the increased flexibility provided by P4 also brings significant security challenges, particularly in managing sensitive data and preventing information leakage within the data-plane. This paper presents a novel security type system for analyzing information flow in P4 programs that combines security types with interval analysis. The proposed type system allows the specification of security policies in terms of input and output packet bit fields rather than program variables. We formalize this type system and prove it sound, guaranteeing that well-typed programs satisfy noninterference. Our prototype implementation, TAP4S, is evaluated on several use cases, demonstrating its effectiveness in detecting security violations and information leakages.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
National Category
Computer Sciences Communication Systems
Identifiers
urn:nbn:se:kth:diva-370452 (URN)10.1109/CSF64896.2025.00031 (DOI)2-s2.0-105014733792 (Scopus ID)
Conference
38th IEEE Computer Security Foundations Symposium, CSF 2025, Santa Cruz, United States of America, June 16-20, 2025
Note

Part of ISBN 9798331510817

QC 20250930

Available from: 2025-09-30 Created: 2025-09-30 Last updated: 2025-09-30Bibliographically approved
Marinaro, T., Buiras, P., Lindner, A., Guanciale, R. & Nemati, H. (2024). Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization. In: ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security: . Paper presented at 19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024, July 1-5, 2024, Singapore, Singapore (pp. 203-216). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization
Show others...
2024 (English)In: ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Association for Computing Machinery (ACM) , 2024, p. 203-216Conference paper, Published paper (Refereed)
Abstract [en]

Since the advent of Spectre attacks, researchers and practitioners have developed a range of hardware and software measures to counter transient execution attacks. A prime example of such mitigation is speculative load hardening (slh) in LLVM, which protects against leaks by tracking the speculation state and masking values during misspeculation. LLVM relies on static analysis to harden programs using slh that often results in over-protection, which incurs performance overhead. We extended an existing side-channel model validation framework, Scam-V, to check the vulnerability of programs to Spectre-PHT attacks and optimize the protection of programs using the slh approach. We illustrate the efficacy of Scam-V by first demonstrating that it can automatically identify Spectre vulnerabilities in programs, e.g., fragments of crypto-libraries. We then develop an optimization mechanism to validate the necessity of slh hardening w.r.t. the target platform. Our experiments showed that hardening introduced by LLVM in most cases could be improved when the underlying microarchitecture properties are considered.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2024
Keywords
countermeasures, hardware security, side-channel attacks, Spectre
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-351495 (URN)10.1145/3634737.3637651 (DOI)001283918100015 ()2-s2.0-85199256356 (Scopus ID)
Conference
19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024, July 1-5, 2024, Singapore, Singapore
Note

Part of ISBN 9798400704826

QC 20241011

Available from: 2024-08-23 Created: 2024-08-23 Last updated: 2024-10-11Bibliographically approved
Alshnakat, A., Lundberg, D., Guanciale, R. & Dam, M. (2024). HOL4P4: Mechanized Small-Step Semantics for P4. Proceedings of the ACM on Programming Languages, 8(OOPSLA1), Article ID 102.
Open this publication in new window or tab >>HOL4P4: Mechanized Small-Step Semantics for P4
2024 (English)In: Proceedings of the ACM on Programming Languages, E-ISSN 2475-1421, Vol. 8, no OOPSLA1, article id 102Article in journal (Refereed) Published
Abstract [en]

We present the first semantics of the network data plane programming language P4 able to adequately capture all key features of P416, the most recent version of P4, including external functions (externs) and concurrency. These features are intimately related since, in P4, extern invocations are the only points at which one execution thread can affect another. Reflecting P4's lack of a general-purpose memory and the presence of multithreading the semantics is given in small-step style and eschews the use of a heap. In addition to the P4 language itself, we provide an architectural level semantics, which allows the composition of P4-programmed blocks, models end-to-end packet processing, and can take into account features such as arbitration and packet recirculation. A corresponding type system is provided with attendant progress, preservation, and type-soundness theorems. Semantics, type system, and meta-theory are formalized in the HOL4 theorem prover. From this formalization, we derive a HOL4 executable semantics that supports verified execution of programs with partially symbolic packets able to validate simple end-to-end program properties.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2024
Keywords
formal verification, interactive theorem proving, P4, programming language semantics
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-348304 (URN)10.1145/3649819 (DOI)001209927600009 ()2-s2.0-85195797284 (Scopus ID)
Note

QC 20240624

Available from: 2024-06-20 Created: 2024-06-20 Last updated: 2025-11-12Bibliographically approved
Soloviev, M., Balliu, M. & Guanciale, R. (2024). Security Properties through the Lens of Modal Logic. In: 2024 IEEE 37th computer security foundations symposium, CSF 2024: . Paper presented at 37th IEEE Computer Security Foundations Symposium (CSF), JUL 08-12, 2024, Enschede, NETHERLANDS (pp. 340-355). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Security Properties through the Lens of Modal Logic
2024 (English)In: 2024 IEEE 37th computer security foundations symposium, CSF 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 340-355Conference paper, Published paper (Refereed)
Abstract [en]

We introduce a framework for reasoning about the security of computer systems using modal logic. This framework is sufficiently expressive to capture a variety of known security properties, while also being intuitive and independent of syntactic details and enforcement mechanisms. We show how to use our formalism to represent various progress- and termination-(in)sensitive variants of confidentiality, integrity, robust declassification and transparent endorsement, and prove equivalence to standard definitions. The intuitive nature and closeness to semantic reality of our approach allows us to make explicit several hidden assumptions of these definitions, and identify potential issues and subtleties with them, while also holding the promise of formulating cleaner versions and future extension to entirely novel properties.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
Proceedings IEEE Computer Security Foundations Symposium, ISSN 1940-1434
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-356024 (URN)10.1109/CSF61375.2024.00009 (DOI)001322679500023 ()2-s2.0-85205990384 (Scopus ID)
Conference
37th IEEE Computer Security Foundations Symposium (CSF), JUL 08-12, 2024, Enschede, NETHERLANDS
Note

Part of ISBN 979-8-3503-6204-6, 979-8-3503-6203-9

QC 20241111

Available from: 2024-11-11 Created: 2024-11-11 Last updated: 2024-11-11Bibliographically approved
Dong, N., Guanciale, R., Dam, M. & Lööw, A. (2023). Formal Verification of Correctness and Information Flow Security for an In-Order Pipelined Processor. In: Alexander Nadel; Kristin Yvonne Rozier (Ed.), Proceedings of the 23rd Conference on Formal Methods in Computer-Aided Design – FMCAD 2023: . Paper presented at Formal Methods in Computer-Aided Design (FMCAD) 2023, 24-27 Oct. 2023. TU Wien Academic Press
Open this publication in new window or tab >>Formal Verification of Correctness and Information Flow Security for an In-Order Pipelined Processor
2023 (English)In: Proceedings of the 23rd Conference on Formal Methods in Computer-Aided Design – FMCAD 2023 / [ed] Alexander Nadel; Kristin Yvonne Rozier, TU Wien Academic Press , 2023Conference paper, Published paper (Refereed)
Abstract [en]

We present an in-order pipelined processor and its verification in the HOL4 interactive theorem prover. The processor implements the RISC ISA Silver and features a general 5-stage pipeline. The correctness of the processor is proved by exhibiting a refinement relation between the traces of the pipelined circuit and the Silver ISA. The processor is constructed by using a HOL4 Verilog library for formally verified hardware, and its correctness is guaranteed down to the Verilog implementation. Additionally, we analyze the information flow properties of the processor by utilizing the refinement relation. The notion of conditional noninterference formulates that a processor should not leak more information via its timing channel than what is expected by a leakage model expressed at the ISA level. We establish the conditional noninterference for our processor and demonstrate the adaptability of the information flow methodology to accommodate various processor designs, attacker models, and environments. Our approach to verify processor implementations and enable information flow analysis at the circuit level is suitable for ISAs beyond Silver.

Place, publisher, year, edition, pages
TU Wien Academic Press, 2023
Keywords
Formal Verification, Information Flow, Pipelined Processor, Interactive Theorem Prover
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-338911 (URN)10.34727/2023/isbn.978-3-85448-060-0_33 (DOI)001504402400033 ()2-s2.0-85180375645 (Scopus ID)
Conference
Formal Methods in Computer-Aided Design (FMCAD) 2023, 24-27 Oct. 2023
Funder
Swedish Foundation for Strategic Research
Note

QC 20231121

Available from: 2023-11-21 Created: 2023-11-21 Last updated: 2025-12-05Bibliographically approved
Larsen, J. K., Guanciale, R., Haller, P. & Scalas, A. (2023). P4R-Type: A Verified API for P4 Control Plane Programs. Proceedings of the ACM on Programming Languages, 7(OOPSLA2), Article ID 290.
Open this publication in new window or tab >>P4R-Type: A Verified API for P4 Control Plane Programs
2023 (English)In: Proceedings of the ACM on Programming Languages, E-ISSN 2475-1421, Vol. 7, no OOPSLA2, article id 290Article in journal (Refereed) Published
Abstract [en]

Software-Defined Networking (SDN) significantly simplifies programming, reconfiguring, and optimizing network devices, such as switches and routers. The de facto standard for programming SDN devices is the P4 language. However, the flexibility and power of P4, and SDN more generally, gives rise to important risks. As a number of incidents at major cloud providers have shown, errors in SDN programs can compromise the availability of networks, leaving them in a non-functional state. The focus of this paper are errors in control-plane programs that interact with P4-enabled network devices via the standardized P4Runtime API. For clients of the P4Runtime API it is easy to make mistakes that may lead to catastrophic failures, despite the use of Google's Protocol Buffers as an interface definition language. This paper proposes P4R-Type, a novel verified P4Runtime API for Scala that performs static checks for P4 control plane operations, ruling out mismatches between P4 tables, allowed actions, and action parameters. As a formal foundation of P4R-Type, we present the FP4R calculus and its typing system, which ensure that well-typed programs never get stuck by issuing invalid P4Runtime operations. We evaluate the safety and flexibility of P4R-Type with 3 case studies. To the best of our knowledge, this is the first work that formalises P4Runtime control plane applications, and a typing discipline ensuring the correctness of P4Runtime operations.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2023
Keywords
P4, P4Runtime, Semantics, Software-defined networking, Type systems
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-339489 (URN)10.1145/3622866 (DOI)001087279100070 ()2-s2.0-85175024779 (Scopus ID)
Note

QC 20231113

Available from: 2023-11-13 Created: 2023-11-13 Last updated: 2024-02-29Bibliographically approved
Bocci, A., Forti, S., Guanciale, R., Ferrari, G.-L. & Brogi, A. (2023). Secure Partitioning of Cloud Applications, with Cost Look-Ahead. Future Internet, 15(7), Article ID 224.
Open this publication in new window or tab >>Secure Partitioning of Cloud Applications, with Cost Look-Ahead
Show others...
2023 (English)In: Future Internet, E-ISSN 1999-5903, Vol. 15, no 7, article id 224Article in journal (Refereed) Published
Abstract [en]

The security of Cloud applications is a major concern for application developers and operators. Protecting users' data confidentiality requires methods to avoid leakage from vulnerable software and unreliable Cloud providers. Recently, trusted execution environments (TEEs) emerged in Cloud settings to isolate applications from the privileged access of Cloud providers. Such hardware-based technologies exploit separation kernels, which aim at safely isolating the software components of applications. In this article, we propose a methodology to determine safe partitionings of Cloud applications to be deployed on TEEs. Through a probabilistic cost model, we enable application operators to select the best trade-off partitioning in terms of future re-partitioning costs and the number of domains. To the best of our knowledge, no previous proposal exists addressing such a problem. We exploit information-flow security techniques to protect the data confidentiality of applications by relying on declarative methods to model applications and their data flow. The proposed solution is assessed by executing a proof-of-concept implementation that shows the relationship among the future partitioning costs, number of domains and execution times.

Place, publisher, year, edition, pages
MDPI AG, 2023
Keywords
data confidentiality, trusted execution environments, separation kernels, information-flow security, deployment costs, declarative programming
National Category
Computer Systems
Identifiers
urn:nbn:se:kth:diva-334315 (URN)10.3390/fi15070224 (DOI)001038674500001 ()2-s2.0-85166392852 (Scopus ID)
Note

QC 20230818

Available from: 2023-08-18 Created: 2023-08-18 Last updated: 2023-08-18Bibliographically approved
Guanciale, R., Baumann, C., Buiras, P., Dam, M. & Nemati, H. (2022). A Case Study in Information Flow Refinement for Low Level Systems. In: The Logic of Software. A Tasting Menu of Formal Methods: (pp. 54-79). Springer Nature
Open this publication in new window or tab >>A Case Study in Information Flow Refinement for Low Level Systems
Show others...
2022 (English)In: The Logic of Software. A Tasting Menu of Formal Methods, Springer Nature , 2022, p. 54-79Chapter in book (Other academic)
Abstract [en]

In this work we employ information-flow-aware refinement to study security properties of a separation kernel. We focus on refinements that support changes in data representation and semantics, including the addition of state variables that may induce new observational power or side channels. We leverage an epistemic approach to ignorance-preserving refinement where an abstract model is used as a specification of a system’s permitted information flows that may include the declassification of secret information. The core idea is to require that refinement steps must not induce observer knowledge that is not already available in the abstract model. In particular, we show that a simple key manager may cause information leakage via a refinement that includes cache and timing information. Finally, we show that deploying standard countermeasures against cache-based timing channels regains ignorance preservation.

Place, publisher, year, edition, pages
Springer Nature, 2022
Series
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743 ; 13360
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-318002 (URN)10.1007/978-3-031-08166-8_4 (DOI)2-s2.0-85133695692 (Scopus ID)
Note

QC 20220916

Available from: 2022-09-16 Created: 2022-09-16 Last updated: 2022-09-16Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-8069-6495

Search in DiVA

Show all publications