TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Modeling Adversaries with TLA+

126 点作者 Supermighty大约 6 年前

6 条评论

contingencies大约 6 年前
Used TLA+ for security&#x2F;availability modeling at a previous venture. Didn&#x27;t find it added more value than other formal methods with less scope and ambition when it came to implementation, but I had very limited resources and we were greenfield so the experience probably wasn&#x27;t generally applicable.<p>IMHO (from an implementation perspective): (1) If state is a pain to model, this may be a symptom you aren&#x27;t placing interfaces in the right places (ie. scope is too broad). (2) If your system behavior departs from known models (ie. expected behavior under rigorously analyzed and easy to model consensus algorithms) then this may be a symptom of larger issues such as unrecognized state or edge cases, which are better tackled first. (3) A practical alternative to the theoretical model of &#x27;safe&#x27; machines within the post would be an implementation model with a functional approach ... ie. if in doubt, reset to known state. (4) To model &quot;bad&quot; actors practically, you have to define them. To do so within meaningfully any complex (black box) multi-agent (networked) system, you need a good model of known &quot;good&quot; behavior for any given node. Building this is IMHO more useful than pie-in-sky theoretical modeling, because it allows the efficient (~fully automatic) deployment of practical countermeasures (anomaly detection on resource utilization, communication, etc.). To do this for near-arbitrary systems requires a tight CI&#x2F;CD pipeline with above-average full stack security insight, for-purpose infrastructure and management level commitment to the additional resources it will cost. <i>Only</i> when all that is done, model for concurrently compromised nodes at this level, because you&#x27;ve surpassed more immediate&#x2F;pragmatic requirements.
评论 #19855339 未加载
jweir大约 6 年前
The author mentions the World and the Machine by Michael Jackson, I am guessing that is a reference to this paper?<p><a href="http:&#x2F;&#x2F;mcs.open.ac.uk&#x2F;mj665&#x2F;icse17kn.pdf" rel="nofollow">http:&#x2F;&#x2F;mcs.open.ac.uk&#x2F;mj665&#x2F;icse17kn.pdf</a>
评论 #19855337 未加载
weinzierl大约 6 年前
&gt; In the TLA+ formulation, and we can think of an adversary as an agent in the system who can take a superset of the actions everybody else can.<p>Sounds a lot like a Dolev-Yao adversary, which is used in protocol verification tools like Tamarin.
lemmster大约 6 年前
An review of the post is at <a href="https:&#x2F;&#x2F;lemmster.de&#x2F;tla-liveness-review.html" rel="nofollow">https:&#x2F;&#x2F;lemmster.de&#x2F;tla-liveness-review.html</a>
rrggrr大约 6 年前
Anyone have a similar how-to for applying this to decision-making (eg. game theory) in TLA+, Python or similar?
评论 #19855398 未加载
评论 #19856383 未加载
baq大约 6 年前
this is the kind of dark magic that is fascinating to read about and I hope there are people actually using it in the described way to design and implement safe systems and protocols. I haven&#x27;t heard of any (not that I looked much).
评论 #19853640 未加载