Hyperproperties relate multiple computation traces to each other. Model checkers for hyperproperties thus return, in case a system model violates the specification, a set of traces as a counterexample. Fixing the erroneous relations between traces in the system that led to the counterexample is a difficult manual effort that highly benefits from additional explanations. In this paper, we present an explanation method for counterexamples to hyperproperties described in the specification logic HyperLTL. We extend Halpern and Pearl's definition of actual causality to sets of traces witnessing the violation of a HyperLTL formula, which allows us to identify the events that caused the violation. We report on the implementation of our method and ...
Information security properties of reactive systems like non-interference often require relating dif...
Hyperproperties are properties of systems that relate different executions traces, with many applica...
Certain important security policies such as information flow characterize system-wide behaviors and ...
Hyperproperties are properties of computational systems that require more than one trace to evaluate...
Model checkers provide algorithms for proving that a mathematical model of a system satisfies a give...
We investigate the logical foundations of hyperproperties. Hyperproperties generalize trace properti...
Hyperproperties are properties of sets of computation traces. In this paper, we study quantitative h...
We introduce Hyper^2LTL, a temporal logic for the specification of hyperproperties that allows for s...
Hyperproperties, such as non-interference and observational determinism, relate multiple computation...
An enforcement mechanism monitors a reactive system for undesired behavior at runtime and corrects ...
Abstract. Two new logics for verification of hyperproperties are pro-posed. Hyperproperties characte...
Hyperproperties, like observational determinism or symmetry, cannot be expressed as properties of in...
Temporal hyperproperties are system properties that relate multiple execution traces. For (finite-st...
We present $$\backslashtext {RVHyper}$$RVHyper, a runtime verification tool for hyperproperties. Hyp...
Hyperproperties, such as non-interference and observational determinism, relate multiple system exec...
Information security properties of reactive systems like non-interference often require relating dif...
Hyperproperties are properties of systems that relate different executions traces, with many applica...
Certain important security policies such as information flow characterize system-wide behaviors and ...
Hyperproperties are properties of computational systems that require more than one trace to evaluate...
Model checkers provide algorithms for proving that a mathematical model of a system satisfies a give...
We investigate the logical foundations of hyperproperties. Hyperproperties generalize trace properti...
Hyperproperties are properties of sets of computation traces. In this paper, we study quantitative h...
We introduce Hyper^2LTL, a temporal logic for the specification of hyperproperties that allows for s...
Hyperproperties, such as non-interference and observational determinism, relate multiple computation...
An enforcement mechanism monitors a reactive system for undesired behavior at runtime and corrects ...
Abstract. Two new logics for verification of hyperproperties are pro-posed. Hyperproperties characte...
Hyperproperties, like observational determinism or symmetry, cannot be expressed as properties of in...
Temporal hyperproperties are system properties that relate multiple execution traces. For (finite-st...
We present $$\backslashtext {RVHyper}$$RVHyper, a runtime verification tool for hyperproperties. Hyp...
Hyperproperties, such as non-interference and observational determinism, relate multiple system exec...
Information security properties of reactive systems like non-interference often require relating dif...
Hyperproperties are properties of systems that relate different executions traces, with many applica...
Certain important security policies such as information flow characterize system-wide behaviors and ...