Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2019;54(3):336-363.
doi: 10.1007/s10703-019-00334-z. Epub 2019 Jun 25.

Monitoring hyperproperties

Affiliations

Monitoring hyperproperties

Bernd Finkbeiner et al. Form Methods Syst Des. 2019.

Abstract

Hyperproperties, such as non-interference and observational determinism, relate multiple system executions to each other. They are not expressible in standard temporal logics, like LTL, CTL, and CTL*, and thus cannot be monitored with standard runtime verification techniques. HyperLTL extends linear-time temporal logic (LTL) with explicit quantification over traces in order to express hyperproperties. We investigate the runtime verification problem of HyperLTL formulas for three different input models: (1) The parallel model, where a fixed number of system executions is processed in parallel. (2) The unbounded sequential model, where system executions are processed sequentially, one execution at a time. In this model, the number of incoming executions is a-priori unbounded and may in fact grow forever. (3) The bounded sequential model where the traces are processed sequentially and the number of incoming executions is bounded. We show that the existence of a bound in the parallel and bounded sequential models leads to a different notion of monitorability than in the unbounded sequential model. We show that deciding the monitoriability problem for alternation-free HyperLTL is PS P A C E -complete while the problem is undecidable in general. For every input model, we provide monitoring algorithms along with run-time and storage optimizations. By recognizing properties of specifications such as reflexivity, symmetry, and transitivity, we reduce the number of comparisons between traces. For the sequential models, we present a technique that minimizes the number of traces that need to be stored. We evaluate our optimizations, showing that this leads to a more scalable monitoring and, in particular, a significantly lower memory consumption.

Keywords: Hyperproperties; Information-flow; Monitoring; Runtime verification.

PubMed Disclaimer

Figures

Fig. 1
Fig. 1
Monitor approaches for the parallel model: online in a forward fashion (left) and offline in a backwards fashion (right)
Fig. 2
Fig. 2
Monitor approaches for the sequential models: an unbounded number of traces (left) and bounded number of traces (right) are processed sequentially
Fig. 3
Fig. 3
Visualization of a monitor template corresponding to the formula given in Eq. 1. We use a symbolic representation of the transition function δ
Fig. 4
Fig. 4
Online algorithm for the parallel model, where i:= if the i-th quantifier in φ is a universal quantifier and otherwise
Fig. 5
Fig. 5
Offline backwards algorithm for the parallel model, where i:= if the i-th quantifier in φ is a universal quantifier and otherwise
Fig. 6
Fig. 6
Evaluation algorithm for monitoring n HyperLTL formulas in the unbounded sequential model
Fig. 7
Fig. 7
Storage Minimization Algorithm
Fig. 8
Fig. 8
Absolute numbers of violations in red (dotted), number of instances stored in blue (dashed), number of instances pruned in green (solid) for 105 randomly generated traces of length 100, 000. The y axis is scaled logarithmically
Fig. 9
Fig. 9
Hamming-distance preserving encoder: runtime comparison of naive monitoring approach with different optimizations and a combination thereof
Fig. 10
Fig. 10
mux circuit with black box
Fig. 11
Fig. 11
Monitoring of black box circuits: runtime comparison of naive monitoring approach with different optimizations and a combination thereof

References

    1. Agrawal S, Bonakdarpour B (2016) Runtime verification of k-safety hyperproperties in HyperLTL. In: Proceedings of CSF, IEEE Computer Society, pp 239–252
    1. Askarov A, Sabelfeld A (2009) Tight enforcement of information-release policies for dynamic languages. In: Proceedings of CSF, IEEE Computer Society, pp 43–59
    1. Austin TH, Flanagan C (2010) Permissive dynamic information flow analysis. In: Proceedings of PLAS, ACM, p 3
    1. Barringer H, Falcone Y, Havelund K, Reger G, Rydeheard DE (2012) Quantified event automata: towards expressive and efficient runtime monitors. In: Proceedings of FM, volume 7436 of LNCS, Springer, pp 68–84
    1. Bauer A (2010) Monitorability of omega-regular languages. In: CoRR. arXiv:1006.3638

LinkOut - more resources