Privacy-preserving runtime verification
Karimi M. 2026. Privacy-preserving runtime verification. Institute of Science and Technology Austria.
Download
Thesis
| MS
| Published
| English
Author
Supervisor
Corresponding author has ISTA affiliation
Department
Grant
Series Title
ISTA Master’s Thesis
Abstract
Runtime verification offers scalable solutions to improve the safety and reliability of systems. However, systems that require verification or monitoring by a third party to ensure compliance with a specification might contain sensitive information, causing privacy concerns when usual runtime verification approaches are used. Privacy is compromised if protected information about the system, or sensitive data that is processed by the system, is revealed. In addition, revealing the specification being monitored may undermine the essence of third-party verification.
In this thesis, we propose a protocol for privacy-preserving runtime verification of systems against formal sequential specifications. We develop the protocol in two steps. In the first step, the monitor verifies whether the system satisfies the specification without learning anything else, though both parties are aware of the specification. In the second step, we extend the protocol to ensure that the system remains oblivious to the monitored specification, while the monitor learns only whether the system satisfies the specification and nothing more. Our protocol adapts and improves existing techniques used in cryptography, and more specifically, multi-party computation.
The sequential specification defines the observation step of the monitor, whose granularity depends on the situation (e.g., banks may be monitored on a daily basis). Our protocol exchanges a single message per observation step, after an initialization phase. This design minimizes communication overhead, enabling relatively lightweight privacy-preserving monitoring. We implement our approach for monitoring specifications described by register automata and evaluate it experimentally.
Keywords
Publishing Year
Date Published
2026-03-05
Publisher
Institute of Science and Technology Austria
Acknowledgement
This work is part of the project VAMOS, which has received funding from the European
Research Council (ERC) under grant agreement No. 101020093, and the Austrian Science
Fund (FWF) SFB project SpyCoDe F8502.
Page
60
ISSN
IST-REx-ID
Cite this
Karimi M. Privacy-preserving runtime verification. 2026. doi:10.15479/AT-ISTA-21401
Karimi, M. (2026). Privacy-preserving runtime verification. Institute of Science and Technology Austria. https://doi.org/10.15479/AT-ISTA-21401
Karimi, Mahyar. “Privacy-Preserving Runtime Verification.” Institute of Science and Technology Austria, 2026. https://doi.org/10.15479/AT-ISTA-21401.
M. Karimi, “Privacy-preserving runtime verification,” Institute of Science and Technology Austria, 2026.
Karimi M. 2026. Privacy-preserving runtime verification. Institute of Science and Technology Austria.
Karimi, Mahyar. Privacy-Preserving Runtime Verification. Institute of Science and Technology Austria, 2026, doi:10.15479/AT-ISTA-21401.
All files available under the following license(s):
Copyright Statement:
This Item is protected by copyright and/or related rights. [...]
Main File(s)
File Name
2026_Karimi_Mahyar_Thesis.pdf
766.05 KB
Access Level
Open Access
Date Uploaded
2026-03-06
MD5 Checksum
3f49f05c9d123e14d7adb73d3bc50fe2
Source File
File Name
Access Level
Closed Access
Date Uploaded
2026-03-06
MD5 Checksum
8fb9db4b4187e26443369a993427a5ff
