Skip to main content

Sampling a Two-Way Finite Automaton

  • Chapter

Part of the book series: Emergence, Complexity and Computation ((ECC,volume 12))

Abstract

We study position sampling in a 2-way nondeterministic finite automaton (2NFA) to measure the information dependency and information flow between state variables, based on the information-theoretic sampling technique proposed in [16]. We prove that for a 2NFA, the language generated by position sampling is regular. We also show that for a 2NFA, we can effectively find a vector of sampling positions that maximizes dependency and information flow in a run of the 2NFA. Finally, we give some language properties of sampled runs of 2NFAs augmented with restricted unbounded storage.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alur, R., Dill, D.L.: A theory of timed automata. Theoretical Computer Science 126(2), 183–235 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  2. Cavadini, S.: Secure slices of insecure programs. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, pp. 112–122 (2008)

    Google Scholar 

  3. Chomsky, N., Miller, G.A.: Finite state languages. Information and Control 1, 91–112 (1958)

    Article  MATH  MathSciNet  Google Scholar 

  4. Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security 15 (2007)

    Google Scholar 

  5. Cui, C., Dang, Z.: Fischer: Bit rate of programs (submitted)

    Google Scholar 

  6. Cui, C., Dang, Z., Fischer, T., Ibarra, O.: Similarity in languages and programs. Theoretical Computer Science 498, 58–75 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  7. Cui, C., Dang, Z., Fischer, T.R., Ibarra, O.H.: Execution information rate for some classes of automata. In: Dediu, A.-H., Martín-Vide, C., Truthe, B. (eds.) LATA 2013. LNCS, vol. 7810, pp. 226–237. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  8. Dang, Z.: Pushdown timed automata: a binary reachability characterization and safety verification. Theoretical Computer Science 302(1-3), 93–121 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  9. Dang, Z., Ibarra, O., Bultan, T., Kemmerer, R., Su, J.: Binary reachability analysis of discrete pushdown timed automata. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol. 1855, pp. 69–84. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  10. Ginsburg, S., Greibach, S.A., Harrison, M.A.: One-way stack automata. Journal of the ACM (JACM) 14(2), 389–418 (1967)

    Article  MATH  MathSciNet  Google Scholar 

  11. Goguen, J.A., Meseguer, J.: Security Policies and Security Models. In: IEEE Symposium on Security and Privacy, pp. 11–20 (1982)

    Google Scholar 

  12. Gray I, J.W.: Toward a mathematical foundation for information flow security. In: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 21–34 (May 1991)

    Google Scholar 

  13. Gurari, E.M., Ibarra, O.H.: The complexity of decision problems for finite-turn multicounter machines. Journal of Computer and System Sciences 22(2), 220–229 (1981)

    Article  MATH  MathSciNet  Google Scholar 

  14. Ibarra, O.H.: Reversal-bounded multicounter machines and their decision problems. J. ACM 25(1), 116–133 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  15. Ibarra, O.H., Dang, Z., Egecioglu, O., Saxena, G.: Characterizations of catalytic membrane computing systems. In: Rovan, B., Vojtáš, P. (eds.) MFCS 2003. LNCS, vol. 2747, pp. 480–489. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Li, Q., Dang, Z.: Sampling automata and programs (submitted)

    Google Scholar 

  17. McLean, J.: Security models and information flow. In: Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 180–187 (May 1990)

    Google Scholar 

  18. McCamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity. SIGPLAN Not. 43(6), 193–205 (2008)

    Article  Google Scholar 

  19. McIver, A., Morgan, C.: A probabilistic approach to information hiding. In: McIver, A., Morgan, C. (eds.) Programming Methodology. Monographs in Computer Science, pp. 441–460. Springer, New York (2003)

    Chapter  Google Scholar 

  20. Millen, J.K.: Covert channel capacity. In: IEEE Symposium on Security and Privacy, Oakland, CA, pp. 60–66 (1987)

    Google Scholar 

  21. Paun, G.: Membrane Computing, an Introduction. Springer, Heidelberg (2000)

    Google Scholar 

  22. Shannon, C.E., Weaver, W.: The Mathematical Theory of Communication. University of Illinois Press (1949)

    Google Scholar 

  23. Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1998, pp. 355–364. ACM, New York (1998)

    Google Scholar 

  24. Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288–302. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  25. Terauchi, T.: A type system for observational determinism. In: IEEE 21st Computer Security Foundations Symposium, CSF 2008, pp. 287–300 (June 2008)

    Google Scholar 

  26. Yang, L., Cui, C., Dang, Z., Fischer, T.R.: An information-theoretic complexity metric for labeled graphs (submitted)

    Google Scholar 

  27. Wang, E., Cui, C., Dang, Z., Fischer, T.R., Yang, L.: Zero-knowledge blackbox testing: where are the faults? International Journal of Foundations of Computer Science (to appear)

    Google Scholar 

  28. Weiser, M.: Program Slicing. IEEE Transactions on Software Engineering 10, 352–357 (1984)

    Article  MATH  Google Scholar 

  29. Xie, G., Dang, Z., Ibarra, O.H.: A solvable class of quadratic diophantine equations with applications to verification of infinite-state systems. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol. 2719, pp. 668–680. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  30. Xu, B., Qian, J., Zhang, X., Wu, Z., Chen, L.: A brief survey of program slicing. ACM Sigsoft Software Engineering Notes 30, 1–36 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Dang, Z., Ibarra, O.H., Lin, Q. (2015). Sampling a Two-Way Finite Automaton. In: Adamatzky, A. (eds) Automata, Universality, Computation. Emergence, Complexity and Computation, vol 12. Springer, Cham. https://doi.org/10.1007/978-3-319-09039-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09039-9_4

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09038-2

  • Online ISBN: 978-3-319-09039-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics