Minimizing the Information Leakage Regarding High-Level Task Specifications

Michael Hibbard, Yagiz Savas, Zhe Xu, Ufuk Topcu

Research output: Contribution to journalConference articlepeer-review


We consider a scenario in which an autonomous agent carries out a mission in a stochastic environment while passively observed by an adversary. For the agent, minimizing the information leaked to the adversary regarding its high-level specification is critical in creating an informational advantage. We express the specification of the agent as a parametric linear temporal logic formula, measure the information leakage by the adversary's confidence in the agent's mission specification, and propose algorithms to synthesize a policy for the agent which minimizes the information leakage to the adversary. In the scenario considered, the adversary aims to infer the specification of the agent from a set of candidate specifications, each of which has an associated likelihood probability. The agent's objective is to synthesize a policy that maximizes the entropy of the adversary's likelihood distribution while satisfying its specification. We propose two approaches to solve the resulting synthesis problem. The first approach computes the exact satisfaction probabilities for each candidate specification, whereas the second approach utilizes the Fréchet inequalities to approximate them. For each approach, we formulate a mixed-integer program with a quasiconcave objective function. We solve the problem using a bisection algorithm. Finally, we compare the performance of both approaches on numerical simulations.

Original languageEnglish (US)
Pages (from-to)15388-15395
Number of pages8
Issue number2
StatePublished - 2020
Externally publishedYes
Event21st IFAC World Congress 2020 - Berlin, Germany
Duration: Jul 12 2020Jul 17 2020


  • Autonomous Mobile Robots
  • Mission planning
  • Path Planning
  • Trajectory
  • decision making

ASJC Scopus subject areas

  • Control and Systems Engineering


Dive into the research topics of 'Minimizing the Information Leakage Regarding High-Level Task Specifications'. Together they form a unique fingerprint.

Cite this