{"_id":"21401","file":[{"date_created":"2026-03-06T14:06:25Z","checksum":"3f49f05c9d123e14d7adb73d3bc50fe2","relation":"main_file","file_id":"21404","content_type":"application/pdf","date_updated":"2026-03-10T15:20:09Z","file_name":"2026_Karimi_Mahyar_Thesis.pdf","file_size":766048,"access_level":"open_access","creator":"mkarimi"},{"file_size":1243394,"creator":"mkarimi","access_level":"closed","date_created":"2026-03-06T14:06:25Z","checksum":"8fb9db4b4187e26443369a993427a5ff","relation":"source_file","file_id":"21405","file_name":"2026_Karimi_Mahyar_Thesis_src.zip","date_updated":"2026-03-06T14:06:25Z","content_type":"application/zip"}],"date_created":"2026-03-05T15:20:47Z","related_material":{"record":[{"id":"21020","relation":"part_of_dissertation","status":"public"}]},"publication_status":"published","acknowledgement":"This work is part of the project VAMOS, which has received funding from the European\r\nResearch Council (ERC) under grant agreement No. 101020093, and the Austrian Science\r\nFund (FWF) SFB project SpyCoDe F8502.\r\n","language":[{"iso":"eng"}],"doi":"10.15479/AT-ISTA-21401","year":"2026","page":"60","publication_identifier":{"issn":["2791-4585"]},"user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","abstract":[{"text":"Runtime verification offers scalable solutions to improve the safety and reliability of systems. However, systems that require verification or monitoring by a third party to ensure compliance with a specification might contain sensitive information, causing privacy concerns when usual runtime verification approaches are used. Privacy is compromised if protected information about the system, or sensitive data that is processed by the system, is revealed. In addition, revealing the specification being monitored may undermine the essence of third-party verification.\r\n\r\nIn this thesis, we propose a protocol for privacy-preserving runtime verification of systems against formal sequential specifications. We develop the protocol in two steps. In the first step, the monitor verifies whether the system satisfies the specification without learning anything else, though both parties are aware of the specification. In the second step, we extend the protocol to ensure that the system remains oblivious to the monitored specification, while the monitor learns only whether the system satisfies the specification and nothing more. Our protocol adapts and improves existing techniques used in cryptography, and more specifically, multi-party computation.\r\n\r\nThe sequential specification defines the observation step of the monitor, whose granularity depends on the situation (e.g., banks may be monitored on a daily basis). Our protocol exchanges a single message per observation step, after an initialization phase. This design minimizes communication overhead, enabling relatively lightweight privacy-preserving monitoring. We implement our approach for monitoring specifications described by register automata and evaluate it experimentally.\r\n","lang":"eng"}],"ddc":["000"],"file_date_updated":"2026-03-10T15:20:09Z","citation":{"ista":"Karimi M. 2026. Privacy-preserving runtime verification. Institute of Science and Technology Austria.","chicago":"Karimi, Mahyar. “Privacy-Preserving Runtime Verification.” Institute of Science and Technology Austria, 2026. https://doi.org/10.15479/AT-ISTA-21401.","apa":"Karimi, M. (2026). Privacy-preserving runtime verification. Institute of Science and Technology Austria. https://doi.org/10.15479/AT-ISTA-21401","short":"M. Karimi, Privacy-Preserving Runtime Verification, Institute of Science and Technology Austria, 2026.","ama":"Karimi M. Privacy-preserving runtime verification. 2026. doi:10.15479/AT-ISTA-21401","ieee":"M. Karimi, “Privacy-preserving runtime verification,” Institute of Science and Technology Austria, 2026.","mla":"Karimi, Mahyar. Privacy-Preserving Runtime Verification. Institute of Science and Technology Austria, 2026, doi:10.15479/AT-ISTA-21401."},"ec_funded":1,"month":"03","article_processing_charge":"No","author":[{"first_name":"Mahyar","orcid":"0009-0005-0820-1696","full_name":"Karimi, Mahyar","id":"6e5417ba-5355-11ee-ae5a-94c2e510b26b","last_name":"Karimi"}],"oa_version":"Published Version","corr_author":"1","degree_awarded":"MS","date_published":"2026-03-05T00:00:00Z","keyword":["Privacy-preserving verification","Runtime verification","Monitoring","Reactive functionalities","Cryptographic protocols"],"title":"Privacy-preserving runtime verification","alternative_title":["ISTA Master’s Thesis"],"oa":1,"department":[{"_id":"GradSch"},{"_id":"ToHe"}],"type":"dissertation","day":"05","OA_place":"repository","has_accepted_license":"1","date_updated":"2026-03-13T13:37:20Z","project":[{"_id":"62781420-2b32-11ec-9570-8d9b63373d4d","grant_number":"101020093","call_identifier":"H2020","name":"Vigilant Algorithmic Monitoring of Software"},{"name":"Security and Privacy by Design for Complex Systems","_id":"34a4ce89-11ca-11ed-8bc3-8cc37fb6e11f","grant_number":"F8512"}],"status":"public","publisher":"Institute of Science and Technology Austria","supervisor":[{"first_name":"Thomas A","full_name":"Henzinger, Thomas A","orcid":"0000-0002-2985-7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger"}]}