Privacy-preserving runtime verification
Henzinger TA, Karimi M, Thejaswini KS. 2025. Privacy-preserving runtime verification. Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. CCS: Conference on Computer and Communications Security, 2774–2787.
Download
Conference Paper
| Published
| English
Scopus indexed
Corresponding author has ISTA affiliation
Department
Abstract
Runtime verification offers scalable solutions to improve the safety and reliability of systems. However, systems that require verification or monitoring by a third party to ensure compliance with a specification might contain sensitive information, causing privacy concerns when usual runtime verification approaches are used. Privacy is compromised if protected information about the system, or sensitive data that is processed by the system, is revealed. In addition, revealing the specification being monitored may undermine the essence of third-party verification.
In this work, we propose two novel protocols for the privacy-preserving runtime verification of systems against formal sequential specifications. In our first protocol, the monitor verifies whether the system satisfies the specification without learning anything else, though both parties are aware of the specification. Our second protocol ensures that the system remains oblivious to the monitored specification, while the monitor learns only whether the system satisfies the specification and nothing more. Our protocols adapt and improve existing techniques used in cryptography, and more specifically, multi-party computation.
The sequential specification defines the observation step of the monitor, whose granularity depends on the situation (e.g., banks may be monitored on a daily basis). Our protocols exchange a single message per observation step, after an initialisation phase. This design minimises communication overhead, enabling relatively lightweight privacy-preserving monitoring. We implement our approach for monitoring specifications described by register automata and evaluate it experimentally.
Publishing Year
Date Published
2025-11-22
Proceedings Title
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security
Publisher
Association for Computing Machinery
Acknowledgement
This work is a part of projects VAMOS that has received fund-ing from the European Research Council (ERC), grant agreementNo 101020093 and the Austrian Science Fund (FWF) SFB projectSpyCoDe F8502.We thank anonymous reviewers for pointing us to related work [ 3] and for their valuable suggestions that improved this paper.
Page
2774-2787
Conference
CCS: Conference on Computer and Communications Security
Conference Location
Taipei, Taiwan
Conference Date
2025-10-13 – 2025-10-17
ISBN
IST-REx-ID
Cite this
Henzinger TA, Karimi M, Thejaswini KS. Privacy-preserving runtime verification. In: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery; 2025:2774-2787. doi:10.1145/3719027.3765137
Henzinger, T. A., Karimi, M., & Thejaswini, K. S. (2025). Privacy-preserving runtime verification. In Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (pp. 2774–2787). Taipei, Taiwan: Association for Computing Machinery. https://doi.org/10.1145/3719027.3765137
Henzinger, Thomas A, Mahyar Karimi, and K. S. Thejaswini. “Privacy-Preserving Runtime Verification.” In Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2774–87. Association for Computing Machinery, 2025. https://doi.org/10.1145/3719027.3765137.
T. A. Henzinger, M. Karimi, and K. S. Thejaswini, “Privacy-preserving runtime verification,” in Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, Taipei, Taiwan, 2025, pp. 2774–2787.
Henzinger TA, Karimi M, Thejaswini KS. 2025. Privacy-preserving runtime verification. Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. CCS: Conference on Computer and Communications Security, 2774–2787.
Henzinger, Thomas A., et al. “Privacy-Preserving Runtime Verification.” Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, 2025, pp. 2774–87, doi:10.1145/3719027.3765137.
All files available under the following license(s):
Creative Commons Attribution 4.0 International Public License (CC-BY 4.0):
Main File(s)
File Name
2025_CCS_HenzingerT.pdf
1.24 MB
Access Level
Open Access
Date Uploaded
2026-01-21
MD5 Checksum
615ffddab6c7285158c2953acec6fa6f
Export
Marked PublicationsOpen Data ISTA Research Explorer
Sources
arXiv 2505.09276
