Probabilistic Obstruction Temporal Logic:
a Probabilistic Logic to Reason about Dynamic Models
Abstract
In this paper, we propose a novel formalism called Probabilistic Obstruction Temporal Logic (POTL), which extends Obstruction Logic (OL) by incorporating probabilistic elements. POTL provides a robust framework for reasoning about the probabilistic behaviors and strategic interactions between attackers and defenders in environments where probabilistic events influence outcomes. We explore the model checking complexity of POTL and demonstrate that it is not higher than that of Probabilistic Computation Tree Logic (PCTL), making it both expressive and computationally feasible for cybersecurity and privacy applications.
1 Introduction
Understanding and quantifying uncertainty is essential in cybersecurity, and probability theory offers a robust framework for this purpose, making it particularly valuable for risk analysis. As digital systems grow increasingly complex and dynamic, effectively assessing and managing risks becomes more challenging. Probability theory allows organizations to model the likelihood of various cyber threats, such as hacking attempts, data breaches, and software vulnerabilities, which are inherently uncertain and variable. Cybersecurity professionals can estimate the likelihood of these threats materializing and assess their potential impact on systems by applying probabilistic and non-probabilistic formalisms.
Researchers have developed various solutions over the past fifty years, with formal methods emerging as a notable success. These techniques allow for the verification of system correctness by checking if a mathematical model meets the formalized desired behavior. Notably, traditional formal approaches like model checking (Baier and Katoen 2008), initially designed for monolithic systems, have been effectively adapted to manage open and Multi-Agent Systems (MAS). In recent years, the study of MAS has garnered significant attention due to its wide-ranging applications in fields such as cybersecurity, robotics, and distributed computing. MAS consists of two or more interacting agents, each capable of making autonomous decisions. These systems often operate in dynamic and uncertain environments, necessitating robust formal verification techniques to ensure their reliability and correctness.
An important logic in the context of MAS is Alternating-time Temporal Logic (ATL) (Alur, Henzinger, and Kupferman 2002). The latter extends CTL (Clarke and Emerson 1981) by introducing strategic modalities, enabling the specification of properties that involve the strategic abilities of agents. ATL can express whether a group of agents can achieve a certain goal regardless of the actions of other agents, making it a powerful tool for reasoning about cooperation and competition in MAS.
Another relevant formalism in this area is Obstruction Logic (OL) (Catta, Leneutre, and Malvone 2023b), which focuses on obstructions in two-player games. In OL, one player, called the Demon, can temporarily disable edges in the graph as long as their total weight remains below a specified natural number, thereby preventing the other agent from achieving its temporal goal. As illustrated in their paper, OL can be well-suited for representing cybersecurity problems, where a defender can activate defense mechanisms (by disabling edges) and an attacker aims to access private resources through a sequence of atomic attacks.
In this context, a key aspect when performing cybersecurity risk analysis is to assess the likelihood (or probability) of success of the attack scenarios. However, OL did not address this aspect, where no probabilistic concepts were introduced. For the above reasons, in this paper, we present Probabilistic Obstruction Temporal Logic (POTL), a logic that extends OL into a probabilistic context. POTL offers a comprehensive framework for analyzing the probabilistic behaviors and strategic interactions between attackers and defenders in scenarios where probabilistic events influence outcomes. We investigate the model checking complexity of POTL and show that it is comparable to that of Probabilistic Computation Tree Logic, ensuring that POTL remains both expressive and computationally practical for cybersecurity and privacy applications.
Structure of the work.
The contribution is structured as follows. Theoretical background is presented in Section 2. In Section 3, we present the syntax and the semantics of our new logic, called Probabilistic Obstruction Temporal Logic (POTL). In Section 4, we show our model checking algorithm and prove that the model checking problem for POTL is decidable in polyonimal-time. In section 5, we present an illustrative example related to the cybersecurity analysis. In Section 6, we compare our approach to related work. Finally, Section 7 concludes and presents possible future directions.
2 Background
In this section, we discuss the basic notions that are used in the technical part of this paper.
General Concepts.
Let be the set of natural numbers, we refer to the set of natural numbers containing as , the set of non-negative reals and the set of integers. Let and be two sets and denotes its cardinality. The set operations of intersection, union, complementation, set difference, and Cartesian product are denoted , , , , and , respectively. Inclusion and strict inclusion are denoted and , respectively. The empty set is denoted . Let be a finite sequence, denotes the last element of .
Probability Distribution and Space.
Let be a finite set and be a probability distribution function over such that . We denote by the set of all such distributions over . For a given , = is called the support of . The standard notation of a probability space is a triple , where is a sample space that represents all possible outcomes, is a -algebra over , i.e., it includes the empty subset, and it is closed under countable unions and complement, and Pr: is a probability measure over . We denote the set of all finite and infinite sequences of elements of by and , respectively.
Attack Graphs and Moving Target Defense Mechanisms.
A malicious attack is defined as an attempt by an attacker to gain unauthorized access to resources or compromise the integrity of the system. In this context, the Attack Graph (AG) (Kaynar 2016) is a widely recognized and increasingly popular attack model. By leveraging an AG, it is possible to model interactions between an attacker and a defender who dynamically deploys Moving Target Defense (MTD) mechanisms (Cho et al. 2020). MTD mechanisms, such as Address Space Layout Randomization (ASLR) (Marco-Gisbert and Ripoll Ripoll 2019), are active defenses that use partial system reconfiguration to alter the attack surface and reduce the chances of success of the attack. However, activating an MTD countermeasure impacts system performance: during reconfiguration, system services may be partially or completely unavailable. Thus, it is crucial to select MTD deployment strategies that minimize both residual cybersecurity risks and the negative impact on system performance. However, despite the progress made in the field of AG (Kaynar 2016; Catta, Leneutre, and Malvone 2023a) none of them takes into account some of the uncertainties in the network. Probabilistic Attack Graphs (PAG) are AG enriched with probabilities that model the likelihood of compromise of each node in the graph based on their specific characteristics (Li et al. 2022; Milani et al. 2020).
Kripke Structure and Markov Chain.
A PAG can be viewed as a Probabilistic Kripke Structure (PKS). Now, we will formally define PKS, the Kripke structure that is used to represent all the possible attacks on a networked system.
Definition 1 (Kripke Structure).
A Kripke Structure (KS) over a set of atomic propositions is a tuple = where is a finite, non-empty set of states, is the initial state, is a binary serial relation over (i.e., for any there is a such that ) and is a labeling function assigning a set of atomic propositions to any state .
Definition 2 (Markov Chain).
A Markov Chain (MC) is a pair = where is a (countable) set of states and : is a transition probability function such that for all state , . If is finite, we can consider to be a transition matrix.
A KS can be extended via MC (Kleinberg 2012) to define Probabilistic Kripke Structure (PKS) as follows.
Definition 3 (Probabilistic Kripke Structure).
A PKS over a set of atomic propositions is a tuple = where is a MC, is the initial state and is a labeling function assigning a set of atomic propositions to any state .
Path.
A path over is a finite or infinite sequence of states = starting in the initial state that are built by consecutive steps, i.e., for all . We write to denote the -th element of , to denote the prefix of , and to denote the suffix of . The set of all finite paths starting from in the model is denoted by , and the set of all infinite paths starting from is denoted by . A history is any finite prefix of some path. We use to denote the set of histories. Write for the last state of a history .
Cylinder.
We need to measure the probability of certain sets of paths. Formally, to every we associate the probability space where is the -algebra generated by all basic cylinders sets of paths called cylinder sets, which gather all paths sharing a given finite prefix (i.e., ). Given a finite path = of states, the cylinder set of , denoted ) = , is the set of infinite paths , where is a prefix of . The set of infinite paths is supposed to be equipped with the -algebra generated by the cylinder sets of the finite paths and the probability measure given by = . The extension of from cylinders to the -algebra they generate is unique, and we still denote it . Note that not all sets of paths are measurable with respect to , but the sets we will consider in this paper are simple enough to avoid such difficulties. For the mathematical details of the underlying -algebra and probability measure refer to (Baier and Katoen 2008).
Predecessors and Successors.
Let be a PKS and be one of its states, denotes the set of predecessors of , i.e., . Similarly, denotes the set of successors of , i.e., , and denotes its outgoing edges .
3 Model and Logic
In this section, we define the syntax and semantics of our Probabilistic Obstruction Temporal Logic (POTL). To do this, first, we introduce the Probabilistic Obstruction Temporal Structure (POTS), the type of model that we use to verify POTL properties.
Definition 4 (Probabilistic Obstruction Temporal Structure).
A POTS (model for short) is given by a tuple = where = is a PKS and is a function assigning to any pairs a natural number .
Strategy and Outcomes.
Let be a model, be states in , is the function cost and be a natural number, a -strategy is a function that, given a history , returns a subset , such that: (i) , (ii) . A memoryless n-strategy is a n-strategy such that for all histories and if then . A memoryless n-strategy can be seen as a function whose domain is the set of states of a model . As in ATL logic, the notion of a path that is compatible with a strategy is central to the semantics of Probabilistic Obstruction Logic (POTL) formulas. We define this notion by saying that a path is compatible with an n-strategy if for all we have that . The set of outcomes of an -strategy and state is denoted as and it returns the set of all paths that can result from a strategy and a state . As said in the introduction, our logic (POTL) aims to capture strategies for a particular type of game played over a POTS, in such games, one of the two players (the Demon) has the power to temporally deactivate some transitions of the model. We now introduce the syntax of our logic.
Definition 5.
Let be an at most countable set of atomic formulas (or atoms). Formulas of Probabilistic Obstruction Temporal Logic (POTL, for short) are defined by the following grammar:
where is an atomic formula, is a rational constant, (the grade) and are any natural number in , and .
In the above syntax, we distinguish between state formulas and path formulas . State formulas are evaluated over states and path formulas over paths. A model property is always expressed as a state formula, path formulas appear only as parameters of the probabilistic path operator . The operators (next), (bounded until), (until), (bounded release), and (release), which are standard in temporal logic, are allowed as path formulas. The number is called the grade of the strategic operator. The boolean connectives , and can be defined as usual, we define , and . The size of a formula is the number of its connectives. The intuitive meaning of a formula with temporal formula is “there is a demonic strategy such that all paths of the graphs that are compatible with the strategy satisfy with a probability in relation with constant ” where “demonic strategy” means “a strategy for disabling arcs”. Formulas of POTL can be interpreted over POTS. We can now precisely define the semantics of POTL formulas.
Definition 6.
The satisfaction relation between a model , a state of , and a formula is defined by induction on the structure of :
-
•
for all state ,
-
•
iff ,
-
•
iff not (notation ),
-
•
iff and ,
-
•
iff there is a n-strategy such that .
The satisfaction relation between a model , a path of , and path formula is defined as follows:
-
•
iff ,
-
•
iff there is an such that and for all ,
-
•
iff there is an such that and for all ,
-
•
iff either for all or there is an such that and for all .
-
•
iff either for all or there is an such that and for all .
Let be a formula and be a model, then Sat denotes the set of states of verifying , i.e., Sat. Two formulas and are equivalent (denoted by ) if for all models , Sat = Sat The semantics of the obstruction probabilistic operator refers to the probability for the sets of paths for which a path formula holds. To ensure that this is well-defined, we need to establish that the events specified by POTL path formulas are measurable. Since the set for POTL path formula can be considered as a countable union of cylinder sets, its measurability is ensured. This follows from the following lemma.
Lemma 1.
For each POTL path formula and state of a model , the set is measurable.
Proof.
The approach is similar to the one proposed in (Baier and Katoen 2008) for PCTL. ∎
4 Model Checking
Here, we present our model checking algorithm for POTL. Furthermore, we show that the model checking problem for POTL is decidable in PTIME. POTL model checking algorithm is based on the computation of the set Sat of all states satisfying a POTL formula , followed by checking whether the initial state is included in this set. The most interesting part of our logic is the treatment of the formula = . In order to determine whether , we will use to denote the probability that all paths from that are in accordance with the n-strategy satisfies path formula , that is . Then
We omit the superscript in and when the model is clear from the context. Now, we introduce our predecessor operator. Let = be a set of states, then the predecessor computation is done by the obstruction predecessor operator where is an integer and the operator computes the set of all predecessor states.
Definition 7.
Given a set of states , we define = .
Now, let us define the obstruction predecessor operator.
Definition 8 (Obstruction Predecessor).
Let be a model. Given a state , a natural number , and a set of states , we write:
The general structure of the Algorithm 1 shown here is similar to OL model checking algorithm (Catta, Leneutre, and Malvone 2023b). However, it is now necessary to compute relevant probabilities. For model checking operator applied to a model the probability of a path leaving each state satisfying the path formula must be computed. This may require a calculation involving the operators: next , bounded until (), until (), bounded release (), or release (). We calculate, for an n-strategy and all states , the probabilities: , , , , and respectively.
Let us first consider the next operator. For = , the following equality holds: , where is the transition probability function of . Thus, we have the resulting vector .
Let us consider the bounded until operator. For = , the following equality holds: . The set of states is partitioned into the three disjoint sets to perform the computation associated with this operator: = , = , and = . The sets and contain the states for which is equal to 1 and 0 respectively, and contains all other states. For the set of states we have:
where = ). This is essentially applying the next operator times, while checking the satisfaction of and . Let = be a state indexed vector and by defining the matrix as follows:
The probabilities can be computed as follows. If and , then = 1, and if , = 0. In the case where , the vector can be computed by matrix-vector multiplication = .
Now consider the (unbounded) until operator. For = the following equality holds: . As with the bounded until operator, all states are partitioned into the three disjoint sets , , and . The sets are defined as above. However, the sets , are extended to contain all states for which is 1 or 0. They can be determined with the fixed-point algorithms described in Algorithm 2 (Algo2) and Algorithm 3 (Algo3), respectively. Algo2 (i.e., the set ) is computed by first computing the set of states reachable with non-zero probability that satisfy whose predecessors do not satisfy . Subtracting these states from the set gives the set of states with 0 probability. Algo3 (i.e. the set ) computes similarly the set of states that are reachable with probability less than 1 and that satisfy whose predecessors do not satisfy . The set of states satisfying the operator with probability 1 is determined by subtracting these states from . The reason for precomputing , is that it ensures a unique solution to the linear system of equations and reduces the set of states in for which probabilities must be computed numerically. In addition, the model checking of qualitative properties for which the probability bound is 1 or 0 does not require any further computation. The final set can be computed by solving the linear equation.
where = . To reconstruct the problem in the form . Let be the state indexed vector where if and if , and = – where is the identity matrix and matrix is as defined below:
The Power method (Varga 1962), can then be used to solve the linear system .
Now consider the bounded release operator. For = the following equality holds: . The argument is dual to bounded until operator.
The last case is the (unbounded) release operator. For = the following equality holds: . The argument is dual to unbounded until operator. However, Algorithm 2 and 3 should be modified at line 5, where the intersection operator should be changed to the union operator.
Let us now prove the termination and correctness of the Algorithm 1.
Theorem 1 (Correctness).
Let be a POTS model and be a POTL formula. Then, terminates and iff .
Proof.
(Sketch) Intuitively, termination is straightforward because recursive calls within are always applied to strictly sub-formulas of . Let us prove and by induction over the structure of that, for every and holds iff, .
(Soundness.) For every Sub() and , implies . We prove this by induction over the structure of as follows. For the base case: If , then = . That means holds immediately and follows directly from the truth definition. If ( ), then = by definition. That means holds immediately and for iff then by the truth definition. For the induction case: the cases of boolean combinations, if , then = then induction hypothesis, terminates, therefore, holds. For Sat iff Sat then, Sat which means that by the induction hypothesis then by truth definition. If , then Sat = Sat Sat. By the induction hypothesis, Sat and Sat terminate, therefore, holds. For Sat iff Sat Sat then, Sat and Sat which means that and by the induction hypothesis then by truth definition. The induction step for the remaining obstruction operators is as follows: If = then Sat = by the Sat definition. To prove that holds, we must show terminates. If = , the computation of terminates due to the fact that Sat terminates by the induction hypothesis, and the functions and are finite. If = , the computation of terminates due to the fact that Sat and Sat terminate by the induction hypothesis. , , Sat and Sat are all finite and the solution of the corresponding linear equation systems also terminates. If = , the computation of terminates due to the fact that Sat and Sat terminate by the induction hypothesis. If = , the computation of terminates due to the fact that Sat and Sat terminate by the induction hypothesis. The argument is symmetric to bounded until operator. Let be the set of symbolic states of that is returned by algorithm 3 at line . We need to show that provided that . We first show that . Suppose that . By the definition of satisfaction, this means that there is a strategy such that given any in and note that since the cardinality of is finite, and we can suppose that is memoryless, we can focus on the finite prefix of in which all the are distinct. Let (for be the value of the variable before the first -th iteration of the algorithm. We show that if then . Firstly, note that for all . By definition, we have that , i.e., is computed by taking all the element of that have at most successors that are not in . If = then the proof is similar to the above case.
(Completeness) For every Sub() and , we prove that by induction over the structure of as follows. For the base case: If and ( ), are obvious. For the induction case, the cases of boolean combinations, , then was model checked, and it was found to be true. Thus, . For , then and were model checked and at least one of them was found to be false. Therefore, . The induction step for the remaining obstruction operators is as follows: If = then Sat = by the Sat definition. The proof for , = and = then is similar to the above case (similar for bounded and unbounded ).
∎
The following theorem establishes the complexity of our model checking algorithms.
Theorem 2.
The model checking problem of POTL on POTS is PTIME
Proof.
(Sketch). Algorithm 1 shows a procedure for model checking POTL, which manipulates a set of states of . The procedure is inspired by the model checking for OL (Catta, Leneutre, and Malvone 2023a), PCTL (Hansson and Jonsson 1994) and ATL (Alur, Henzinger, and Kupferman 2002). However, we use two additional procedures and linked to the pre-image function Pre. In detail, our algorithm uses the following functions:
-
•
The function Sub returns an ordered sequence, w.r.t. their complexities, of syntactic sub-formulas of a given formula .
-
•
The function Pre is the same as for OL (Catta, Leneutre, and Malvone 2023a).
-
•
The function takes in input a state , a natural numbers , and a subset of states . Such a function returns true if . If we represent the graph via an adjacent matrix, we can calculate such function in a linear number of steps w.r.t. the size of .
-
•
The function takes in input a natural number and a subset of states . The function returns the subset of , such that for all . The worst possible case is when , and one needs to call -times the function . So, we are quadratic in , i.e. polynomial.
Algorithm 1 works bottom-up on the structure of the formula, the cases of interest are for strategic formulas. For , the procedure calls function to compute the subset of set of states of that are bound to end up in satisfaction set. As regard , the procedure computes the least fixed-point. We observe that, since it is monotone, such a fixed-point always exists. A similar reasoning can be done for , and . From the above, our procedure runs in polynomial-time in the size of the model and formula, where parameter sizes are defined as follows. The size of , is denoted by and the size of a state formula , denoted by , is equal to the number of logical connectives and temporal operators in plus the sum of the size of each bounded temporal operators occurring in and the function . Therefore, checking whether a model satisfies formula , which depends on the size of and is at most , where is the maximal step bound that appears in a subformula of and if = 1, then does not contain a step-bounded until operator. Termination of such procedure is guaranteed, as the state space is finite.
∎
5 Illustration Example
Probability theory is well-suited for cybersecurity risk analysis because it provides a framework for understanding and quantifying uncertainty. To illustrate this, we will consider the following general cybersecurity scenario. Let be an AG and we want to check if there are MTD response strategies that will satisfy certain security goals.
Consider the AG in Fig. 1 with four states: , , , and . Each state represents a state of the attacker in the system. If the attacker is in or , he can perform one or two of the following actions: exploit vulnerability , exploit vulnerability , and access device . If the attacker succeeds in exploiting , he will transition to state . Here, we assume that depending on the attacker’s preferences, there are 70 chance that the attacker will attempt to access equipment and a 30 chance that he will attempt to exploit .
Action | Countermeasure | Cost | Efficiency |
---|---|---|---|
exploit() | 5 | 47.5 | |
access() | 1 | 22.5 | |
exploit() | 3 | 24.7 |
In Table 1, there are the three possible actions the attacker can deploy, with their respective countermeasures, cost, and effectiveness. Let Fig. 2 depict the POTS , constructed using the information from the attack graph presented in (Ismail 2016). Notice that, in contrast to (Ismail 2016), here we remove the actions because we do not have any actions in our POTS model. Therefore, the probabilities present in each state of the model are divided by the number of outgoing actions of that state. In Fig. 2 the yellow line (do nothing), indicates that no countermeasure will be deployed. The red lines ( in Table 1), refer to a defensive countermeasure aimed at protecting the system against the attack attempt. However, has an efficiency of 47.5. Therefore, an attacker attempting to exploit has a 5 chance of success. The violet lines () are a defensive countermeasure against accessing equipment and have an efficiency of 22.5. The orange lines () are a defensive countermeasure against exploiting vulnerability and have an efficiency of 24.7. Finally, green lines refer to the deployment of countermeasures and at the same time. Let us take the case where the defender chooses to deploy the countermeasure (orange lines) in state , the attacker can either succeed or fail in his attack attempt. The efficiency of is 24.7. Therefore, the probability that the attacker fails in his attack attempt is 0.07425 (exploit efficiency. Otherwise, the probability of success is of 0.00075.
Let and be the atomic propositions for the states, and . We can express, via POTL formulas, the following security objective:
-
•
There is a defender strategy with a cost such that the attacker reaches the state satisfying or the state satisfying with a probability less than a given threshold . The following POTL formula captures the objective: .
-
•
There exists a defender strategy with cost 5 such that the probability that the attacker reaches state satisfying is less than 0.2. The following POTL formula captures the objective: .
6 Related Work
There are some papers that have focused on the strategic capabilities of agents playing within dynamic game models. In this section, we compare our approach with them.
Non-Probabilistic Games and Strategic Logics. Some research related to sabotage games has been introduced by van Benthem to study the computational complexity of a special class of graph reachability problems in which an agent has the ability to delete edges (van Benthem 2005; Aucher, Benthem, and Grossi 2018). Sabotage Modal Logic (SML) was introduced by (van Benthem 2005) to reason about sabotage games. The model checking problem for the sabotage modal logic is PSPACE-complete (Löding and Rohde 2003). Our version of the games is not comparable to the sabotage games, because we provide the possibility to temporarily select subsets of edges, while in the sabotage games, the saboteur can only delete one edge at a time. In this respect, our work is related to (Catta, Leneutre, and Malvone 2023a), where the authors use an extended version of sabotage modal logic, called Subset Sabotage Modal Logic (SSML), which allows for the deactivation of certain subsets of edges of a directed graph. The authors show that the model checking problems for such logics are decidable. Also, we recall that SSML is an extension of SML, but does not include temporal operators. Also, neither SML nor SSML takes into account quantitative information about the cost of edges, as we do. In (Stasio et al. 2018) Dynamic Escape Games (DEG) have been introduced. In a DEG, an agent can inhibit edges but only reachability objectives have been studied. In (Catta, Leneutre, and Malvone 2023b) has been introduced Obstruction Logic which allows reasoning about two-player games played on weighted directed graphs. However, all these logics do not include quantitative information about probability and temporal operators.
Probabilistic Games and Strategic Logics. Several papers consider the verification of stochastic games using probabilistic logics. In particular, when agents play deterministic strategies (as in PSL (Aminof et al. 2019)) and probabilistic knowledge (as in PATL and (Huang and Luo 2013)). These logics are extensions of the Alternating- time Temporal Logics ATL and (Alur, Henzinger, and Kupferman 2002) and can be used to reason about the probabilistic knowledge and the probabilistic strategy in stochastic game systems. In (Song et al. 2019), the model checking problem has been studied for probabilistic alternating time -calculus. (Huang, Su, and Zhang 2012) consider the logic Probabilistic under incomplete information and synchronous perfect recall. PATL has also been studied with incomplete information and memoryless strategy (Belardinelli et al. 2023), and with cumulative costs/rewards (Chen et al. 2012). In the context of MAS, probabilistic logic has been used to verify unconstrained parameterized systems, a fragment of called (Lomuscio and Pirovano 2020), constrained resource systems (Probabilistic Resource-Bounded ATL (pRB-ATL) (Nguyen and Rakib 2019), and under assumptions about adversarial strategies, an extension of ATL with probability success (pATL) (Bulling and Jamroga 2009). However, none of these logics combine probabilistic settings with dynamic models.
7 Conclusions
In this paper, we presented POTL, a logic that allows reasoning about probabilistic two-player games temporal goals, where one of the players has the power to locally and temporarily modify the game structure. We proved that its model checking problem is in PTIME. We also showed how POTL expresses cybersecurity properties in a suitable way. Several directions we would like to explore for future work. A possible extension would be to consider probabilistic games with many players, between a demon and coalitions of travelers. Such an extension would have the same relationship with the PATL logic as TOTL has with TCTL. Another extension could be to introduce imperfect information in our setting. Unfortunately, this context is generally non-decidable (Dima and Tiplea 2011). To overcome this problem, we could use an approximation to perfect information (Belardinelli, Ferrando, and Malvone 2023), a notion of bounded memory (Belardinelli et al. 2022), or some hybrid technique (Ferrando and Malvone 2022, 2023).
References
- Alur, Henzinger, and Kupferman (2002) Alur, R.; Henzinger, T.; and Kupferman, O. 2002. Alternating-time temporal logic. J. ACM, 49(5): 672–713.
- Aminof et al. (2019) Aminof, B.; Kwiatkowska, M.; Maubert, B.; Murano, A.; and Rubin, S. 2019. Probabilistic Strategy Logic. In Kraus, S., ed., Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, Macao, China, August 10-16, 2019, 32–38.
- Aucher, Benthem, and Grossi (2018) Aucher, G.; Benthem, J. V.; and Grossi, D. 2018. Modal logics of sabotage revisited. Journal of Logic and Computation, 28(2): 269 – 303.
- Baier and Katoen (2008) Baier, C.; and Katoen, J. 2008. Principles of model checking. MIT Press. ISBN 978-0-262-02649-9.
- Belardinelli, Ferrando, and Malvone (2023) Belardinelli, F.; Ferrando, A.; and Malvone, V. 2023. An abstraction-refinement framework for verifying strategic properties in multi-agent systems with imperfect information. Artif. Intell., 316: 103847.
- Belardinelli et al. (2023) Belardinelli, F.; Jamroga, W.; Mittelmann, M.; and Murano, A. 2023. Strategic Abilities of Forgetful Agents in Stochastic Environments. In Marquis, P.; Son, T. C.; and Kern-Isberner, G., eds., Proceedings of the 20th International Conference on Principles of Knowledge Representation and Reasoning, KR 2023, 726–731.
- Belardinelli et al. (2022) Belardinelli, F.; Lomuscio, A.; Malvone, V.; and Yu, E. 2022. Approximating Perfect Recall when Model Checking Strategic Abilities: Theory and Applications. J. Artif. Intell. Res., 73: 897–932.
- Bulling and Jamroga (2009) Bulling, N.; and Jamroga, W. 2009. What Agents Can Probably Enforce. Fundam. Informaticae, 93(1-3): 81–96.
- Catta, Leneutre, and Malvone (2023a) Catta, D.; Leneutre, J.; and Malvone, V. 2023a. Attack Graphs & Subset Sabotage Games. Intelligenza Artificiale, 17(1): 77–88.
- Catta, Leneutre, and Malvone (2023b) Catta, D.; Leneutre, J.; and Malvone, V. 2023b. Obstruction Logic: A Strategic Temporal Logic to Reason About Dynamic Game Models. In ECAI 2023 - 26th European Conference on Artificial Intelligence.
- Chen et al. (2012) Chen, T.; Forejt, V.; Kwiatkowska, M.; Parker, D.; and Simaitis, A. 2012. Automatic verification of competitive stochastic systems. In Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS’12. Berlin, Heidelberg.
- Cho et al. (2020) Cho, J.; Sharma, D.; Alavizadeh, H.; Yoon, S.; B-A., N.; Moore, T.; Kim, D.; Lim, H.; and Nelson, F. 2020. Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. IEEE Communications Surveys & Tutorials.
- Clarke and Emerson (1981) Clarke, E.; and Emerson, E. 1981. Design and Synthesis of Synchronization Skeletons Using Branching-Time Temporal Logic.
- Dima and Tiplea (2011) Dima, C.; and Tiplea, F. L. 2011. Model-checking ATL under Imperfect Information and Perfect Recall Semantics is Undecidable. CoRR.
- Ferrando and Malvone (2022) Ferrando, A.; and Malvone, V. 2022. Towards the Combination of Model Checking and Runtime Verification on Multi-agent Systems. In 20th International Conference, PAAMS 2022.
- Ferrando and Malvone (2023) Ferrando, A.; and Malvone, V. 2023. Towards the Verification of Strategic Properties in Multi-Agent Systems with Imperfect Information. In Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2023.
- Hansson and Jonsson (1994) Hansson, H.; and Jonsson, B. 1994. A Logic for Reasoning about Time and Reliability. Formal Aspects Comput., 6(5): 512–535.
- Huang and Luo (2013) Huang, X.; and Luo, C. 2013. A logic of probabilistic knowledge and strategy. In Proceedings of the 2013 International Conference on Autonomous Agents and Multi-Agent Systems, AAMAS ’13. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems.
- Huang, Su, and Zhang (2012) Huang, X.; Su, K.; and Zhang, C. 2012. Probabilistic Alternating-Time Temporal Logic of Incomplete Information and Synchronous Perfect Recall. In Hoffmann, J.; and Selman, B., eds., Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, July 22-26, 2012, Toronto, Ontario, Canada, 765–771.
- Ismail (2016) Ismail, Z. 2016. Optimal defense strategies to improve the security and resilience of Smart Grids. Theses, Télécom ParisTech.
- Kaynar (2016) Kaynar, K. 2016. A Taxonomy for Attack Graph Generation and Usage in Network Security. J. Inf. Secur. Appl., 29(C): 27–56.
- Kleinberg (2012) Kleinberg, S. 2012. Causality, Probability, and Time, 241–250. Cambridge University Press.
- Li et al. (2022) Li, L.; Ma, H.; Han, S.; and Fu, J. 2022. Synthesis of Proactive Sensor Placement In Probabilistic Attack Graphs. arXiv:2210.07385.
- Löding and Rohde (2003) Löding, C.; and Rohde, P. 2003. Model Checking and Satisfiability for Sabotage Modal Logic. In FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science.
- Lomuscio and Pirovano (2020) Lomuscio, A.; and Pirovano, E. 2020. Parameterised Verification of Strategic Properties in Probabilistic Multi-Agent Systems. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS ’20. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems.
- Marco-Gisbert and Ripoll Ripoll (2019) Marco-Gisbert, H.; and Ripoll Ripoll, I. 2019. Address Space Layout Randomization Next Generation. Applied Sciences, 9(14).
- Milani et al. (2020) Milani, S.; Shen, W.; Chan, K. S.; Venkatesan, S.; Leslie, N. O.; Kamhoua, C.; and Fang, F. 2020. Harnessing the Power of Deception in Attack Graph-Based Security Games. In Decision and Game Theory for Security: 11th International Conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020, Proceedings, 147–167.
- Nguyen and Rakib (2019) Nguyen, H. N.; and Rakib, A. 2019. A probabilistic logic for resource-bounded multi-agent systems. In Proceedings of the 28th International Joint Conference on Artificial Intelligence, IJCAI’19.
- Song et al. (2019) Song, F.; Zhang, Y.; Chen, T.; Tang, Y.; and Xu, Z. 2019. Probabilistic alternating-time -calculus. In Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, AAAI’19/IAAI’19/EAAI’19.
- Stasio et al. (2018) Stasio, A. D.; Lambiase, P. D.; Malvone, V.; and Murano, A. 2018. Dynamic Escape Game. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS 2018.
- van Benthem (2005) van Benthem, J. 2005. An Essay on Sabotage and Obstruction. Springer Berlin Heidelberg.
- Varga (1962) Varga, R. S. 1962. Matrix Iterative Analysis. Prentice-Hall Series in Automatic Computation. Englewood Cliffs: Prentice-Hall.