Information flow security often involves reasoning about multiple execution traces. This subtlety stems from the fact that an intruder may gain knowledge about the system through observing and comparing several executions. The monitoring of such properties of sets of traces, also known as hyperproperties, is a challenge for runtime verification, because most monitoring techniques are limited to the analysis of a single trace. In this tutorial, we discuss this challenge with respect to HyperLTL, a temporal logic for the specification of hyperproperties.
CITATION STYLE
Bonakdarpour, B., & Finkbeiner, B. (2016). Runtime verification for HyperLTL. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10012 LNCS, pp. 41–45). Springer Verlag. https://doi.org/10.1007/978-3-319-46982-9_4
Mendeley helps you to discover research relevant for your work.