In this paper, we consider the runtime verification problem of safety hyperproperties for deterministic programs. Several security and information-flow policies such as data minimality, non-interference, integrity, and software doping are naturally expressed formally as safety hyperproperties. Although there are monitoring results for hyperproperties, the algorithms are very complex since these are properties over set of traces, and not over single traces. For the deterministic input-output programs that we consider, and the specific safety hyperproperties we are interested in, the problem can be reduced to monitoring of trace properties. In this paper, we present a simpler monitoring approach for safety hyperproperties of deterministic pro...
Abstract. The underlying property, its definition and representation play a major role when monitori...
Hyperproperties are properties that relate multiple execution traces. Previous work on monitoring hy...
The importance of security and reliability of software systems makes formal methods of paramount sig...
Trace properties, which have long been used for reasoning about systems, are sets of execution trace...
Certain important security policies such as information flow characterize system-wide behaviors and ...
Hyperproperties elevate the traditional view of trace properties form sets of traces to sets of sets...
Temporal hyperproperties are system properties that relate multiple execution traces. For (finite-st...
Abstract. The underlying property, its definition and representation play a major role when monitori...
In the context of systems security, information flows play a central role. Unhandled information flo...
An enforcement mechanism monitors a reactive system for undesired behavior at runtime and corrects ...
The underlying property, its definition and representation play a major role when monitoring a syste...
International audienceThe underlying property, its definition and representation play a major role w...
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperti...
—We study the runtime verification of hyperproperties, expressed in the temporal logic HyperLTL, as ...
Hyperproperties, such as non-interference and observational determinism, relate multiple computation...
Abstract. The underlying property, its definition and representation play a major role when monitori...
Hyperproperties are properties that relate multiple execution traces. Previous work on monitoring hy...
The importance of security and reliability of software systems makes formal methods of paramount sig...
Trace properties, which have long been used for reasoning about systems, are sets of execution trace...
Certain important security policies such as information flow characterize system-wide behaviors and ...
Hyperproperties elevate the traditional view of trace properties form sets of traces to sets of sets...
Temporal hyperproperties are system properties that relate multiple execution traces. For (finite-st...
Abstract. The underlying property, its definition and representation play a major role when monitori...
In the context of systems security, information flows play a central role. Unhandled information flo...
An enforcement mechanism monitors a reactive system for undesired behavior at runtime and corrects ...
The underlying property, its definition and representation play a major role when monitoring a syste...
International audienceThe underlying property, its definition and representation play a major role w...
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperti...
—We study the runtime verification of hyperproperties, expressed in the temporal logic HyperLTL, as ...
Hyperproperties, such as non-interference and observational determinism, relate multiple computation...
Abstract. The underlying property, its definition and representation play a major role when monitori...
Hyperproperties are properties that relate multiple execution traces. Previous work on monitoring hy...
The importance of security and reliability of software systems makes formal methods of paramount sig...