Many types of attacks on confidentiality stem from the nondeterministic nature of the environment that computer programs operate in (e.g., schedulers and asynchronous communication channels). In this paper, we focus on verification of confidentiality in nondeterministic environments by reasoning about asynchronous hyperproperties. First, we generalize the temporal logic A-HLTL to allow nested trajectory quantification, where a trajectory determines how different execution traces may advance and stutter. We propose a bounded model checking algorithm for A-HLTL based on QBF-solving for a fragment of the generalized A-HLTL and evaluate it by various case studies on concurrent programs, scheduling attacks, compiler optimization, speculative exe...
Hyperproperties, such as non-interference and observational determinism, relate multiple computation...
In this paper, we study a novel approach to asynchronous hyperproperties by reconsidering the founda...
An enforcement mechanism monitors a reactive system for undesired behavior at runtime and corrects ...
Hyperproperties are properties of computational systems that require more than one trace to evaluate...
Hyperproperties are a modern specification paradigm that extends trace properties to express propert...
We study the satisfiability and model-checking problems for timed hyperproperties specified with Hyp...
Hyperproperties are properties of sets of computation traces. In this paper, we study quantitative h...
Hyperproperties are commonly used in computer security to define information-flow policies and other...
Hyperproperties, such as non-interference and observational determinism, relate multiple system exec...
We study the satisfiability and model-checking problems for timed hyperproperties specified with Hyp...
Hyperproperties are properties of systems that relate different executions traces, with many applica...
Hyperproperties are properties of systems that relate different executions traces, with many applica...
HyperLTL, the extension of Linear Temporal Logic by trace quantifiers, is a uniform framework for ex...
Temporal hyperproperties are system properties that relate multiple execution traces. For (finite-st...
Information security properties of reactive systems like non-interference often require relating dif...
Hyperproperties, such as non-interference and observational determinism, relate multiple computation...
In this paper, we study a novel approach to asynchronous hyperproperties by reconsidering the founda...
An enforcement mechanism monitors a reactive system for undesired behavior at runtime and corrects ...
Hyperproperties are properties of computational systems that require more than one trace to evaluate...
Hyperproperties are a modern specification paradigm that extends trace properties to express propert...
We study the satisfiability and model-checking problems for timed hyperproperties specified with Hyp...
Hyperproperties are properties of sets of computation traces. In this paper, we study quantitative h...
Hyperproperties are commonly used in computer security to define information-flow policies and other...
Hyperproperties, such as non-interference and observational determinism, relate multiple system exec...
We study the satisfiability and model-checking problems for timed hyperproperties specified with Hyp...
Hyperproperties are properties of systems that relate different executions traces, with many applica...
Hyperproperties are properties of systems that relate different executions traces, with many applica...
HyperLTL, the extension of Linear Temporal Logic by trace quantifiers, is a uniform framework for ex...
Temporal hyperproperties are system properties that relate multiple execution traces. For (finite-st...
Information security properties of reactive systems like non-interference often require relating dif...
Hyperproperties, such as non-interference and observational determinism, relate multiple computation...
In this paper, we study a novel approach to asynchronous hyperproperties by reconsidering the founda...
An enforcement mechanism monitors a reactive system for undesired behavior at runtime and corrects ...