Runtime Verification for HyperLTL

被引:10
作者
Bonakdarpour, Borzoo [1 ]
Finkbeiner, Bernd [2 ]
机构
[1] McMaster Univ, Hamilton, ON, Canada
[2] Univ Saarland, Saarbrucken, Germany
来源
RUNTIME VERIFICATION, (RV 2016) | 2016年 / 10012卷
关键词
SECURE INFORMATION-FLOW;
D O I
10.1007/978-3-319-46982-9_4
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Information flow security often involves reasoning about multiple execution traces. This subtlety stems from the fact that an intruder may gain knowledge about the system through observing and comparing several executions. The monitoring of such properties of sets of traces, also known as hyperproperties, is a challenge for runtime verification, because most monitoring techniques are limited to the analysis of a single trace. In this tutorial, we discuss this challenge with respect to HyperLTL, a temporal logic for the specification of hyperproperties.
引用
收藏
页码:41 / 45
页数:5
相关论文
共 19 条
[1]  
Agrawal S., 2016, P 29 IEEE C IN PRESS
[2]  
Alur R, 2006, LECT NOTES COMPUT SC, V4052, P107
[3]  
[Anonymous], 2014, Lecture Notes in Computer Science
[4]  
Balliu M., 2011, P 2011 WORKSH PROGR, P6
[5]   Secure information flow by self-composition [J].
Barthe, G ;
D'Argenio, PR ;
Rezk, T .
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, :100-114
[6]   Runtime Verification for LTL and TLTL [J].
Bauer, Andreas ;
Leucker, Martin ;
Schallhart, Christian .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2011, 20 (04)
[7]   Hyperproperties [J].
Clarkson, Michael ;
Schneider, Fred .
JOURNAL OF COMPUTER SECURITY, 2010, 18 (06) :1157-1210
[8]  
Dimitrova Rayna, 2012, Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change. Technologies for Mastering Change. Proceedings of the 5th International Symposium, ISoLA 2012, P342, DOI 10.1007/978-3-642-34026-0_26
[9]  
Dimitrova R, 2012, LECT NOTES COMPUT SC, V7148, P169, DOI 10.1007/978-3-642-27940-9_12
[10]  
Finkbeiner B., 2016, P ATVA 2016