Privacy-preserving runtime verification

Karimi M. 2026. Privacy-preserving runtime verification. Institute of Science and Technology Austria.

Download
OA 2026_Karimi_Mahyar_Thesis.pdf 766.05 KB [Published Version]

Thesis | MS | Published | English

Corresponding author has ISTA affiliation

Series Title
ISTA Master’s Thesis
Abstract
Runtime verification offers scalable solutions to improve the safety and reliability of systems. However, systems that require verification or monitoring by a third party to ensure compliance with a specification might contain sensitive information, causing privacy concerns when usual runtime verification approaches are used. Privacy is compromised if protected information about the system, or sensitive data that is processed by the system, is revealed. In addition, revealing the specification being monitored may undermine the essence of third-party verification. In this thesis, we propose a protocol for privacy-preserving runtime verification of systems against formal sequential specifications. We develop the protocol in two steps. In the first step, the monitor verifies whether the system satisfies the specification without learning anything else, though both parties are aware of the specification. In the second step, we extend the protocol to ensure that the system remains oblivious to the monitored specification, while the monitor learns only whether the system satisfies the specification and nothing more. Our protocol adapts and improves existing techniques used in cryptography, and more specifically, multi-party computation. The sequential specification defines the observation step of the monitor, whose granularity depends on the situation (e.g., banks may be monitored on a daily basis). Our protocol exchanges a single message per observation step, after an initialization phase. This design minimizes communication overhead, enabling relatively lightweight privacy-preserving monitoring. We implement our approach for monitoring specifications described by register automata and evaluate it experimentally.
Publishing Year
Date Published
2026-03-05
Publisher
Institute of Science and Technology Austria
Acknowledgement
This work is part of the project VAMOS, which has received funding from the European Research Council (ERC) under grant agreement No. 101020093, and the Austrian Science Fund (FWF) SFB project SpyCoDe F8502.
Page
60
ISSN
IST-REx-ID

Cite this

Karimi M. Privacy-preserving runtime verification. 2026. doi:10.15479/AT-ISTA-21401
Karimi, M. (2026). Privacy-preserving runtime verification. Institute of Science and Technology Austria. https://doi.org/10.15479/AT-ISTA-21401
Karimi, Mahyar. “Privacy-Preserving Runtime Verification.” Institute of Science and Technology Austria, 2026. https://doi.org/10.15479/AT-ISTA-21401.
M. Karimi, “Privacy-preserving runtime verification,” Institute of Science and Technology Austria, 2026.
Karimi M. 2026. Privacy-preserving runtime verification. Institute of Science and Technology Austria.
Karimi, Mahyar. Privacy-Preserving Runtime Verification. Institute of Science and Technology Austria, 2026, doi:10.15479/AT-ISTA-21401.
All files available under the following license(s):
Copyright Statement:
This Item is protected by copyright and/or related rights. [...]
Main File(s)
Access Level
OA Open Access
Date Uploaded
2026-03-06
MD5 Checksum
3f49f05c9d123e14d7adb73d3bc50fe2

Source File
Access Level
Restricted Closed Access
Date Uploaded
2026-03-06
MD5 Checksum
8fb9db4b4187e26443369a993427a5ff

Material in ISTA:
Part of this Dissertation

Export

Marked Publications

Open Data ISTA Research Explorer

Search this title in

Google Scholar