Synthesis from hyperproperties

被引:17
作者
Finkbeiner, Bernd [1 ]
Hahn, Christopher [1 ]
Lukert, Philip [1 ]
Stenger, Marvin [1 ]
Tentrup, Leander [1 ]
机构
[1] Saarland Univ, React Syst Grp, Saarbrucken, Germany
基金
欧洲研究理事会; 欧盟地平线“2020”;
关键词
Sensitive data;
D O I
10.1007/s00236-019-00358-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the reactive synthesis problem for hyperproperties given as formulas of the temporal logic HyperLTL. Hyperproperties generalize trace properties, i.e., sets of traces, to sets of sets of traces. Typical examples are information-flow policies like noninterference, which stipulate that no sensitive data must leak into the public domain. Such properties cannot be expressed in standard linear or branching-time temporal logics like LTL, CTL, or CTL*\documentclass[12pt]. Furthermore, HyperLTL subsumes many classical extensions of the LTL realizability problem, including realizability under incomplete information, distributed synthesis, and fault-tolerant synthesis. We show that, while the synthesis problem is undecidable for full HyperLTL, it remains decidable for the there exists*\documentclass[12pt], fragments. Beyond these fragments, the synthesis problem immediately becomes undecidable. For universal HyperLTL, we present a semi-decision procedure that constructs implementations and counterexamples up to a given bound. We report encouraging experimental results obtained with a prototype implementation on example specifications with hyperproperties like symmetric responses, secrecy, and information flow.
引用
收藏
页码:137 / 163
页数:27
相关论文
共 42 条
[1]   Runtime Verification of k-Safety Hyperproperties in HyperLTL [J].
Agrawal, Shreya ;
Bonakdarpour, Borzoo .
2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, :239-252
[2]  
[Anonymous], ICTL
[3]  
[Anonymous], LIPICS
[4]  
Bonakdarpour B, 2018, LECT NOTES COMPUT SC, V11245, P8, DOI 10.1007/978-3-030-03421-4_2
[5]   The Complexity of Monitoring Hyperproperties [J].
Bonakdarpour, Borzoo ;
Finkbeiner, Bernd .
IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, :162-174
[6]   Rewriting-Based Runtime Verification for Alternation-Free HyperLTL [J].
Brett, Noel ;
Siddique, Umair ;
Bonakdarpour, Borzoo .
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2017, PT II, 2017, 10206 :77-93
[7]  
CHAUM D, 1985, COMMUN ACM, V28, P1030, DOI 10.1145/4372.4373
[8]   Quantified Interference for a While Language [J].
Clark, David ;
Hunt, Sebastian ;
Malacaria, Pasquale .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 :149-166
[9]   Hyperproperties [J].
Clarkson, Michael ;
Schneider, Fred .
JOURNAL OF COMPUTER SECURITY, 2010, 18 (06) :1157-1210
[10]  
Clarkson MR, 2014, lecture notes in computer science, V8414, P265