Filters








45 Hits in 1.6 sec

Controller Synthesis for Hyperproperties

Borzoo Bonakdarpour, Bernd Finkbeiner
2020 2020 IEEE 33rd Computer Security Foundations Symposium (CSF)  
We investigate the problem of controller synthesis for hyperproperties specified in the temporal logic HyperLTL. Hyperproperties are system properties that relate multiple execution traces.  ...  Hyperproperties can elegantly express information-flow policies like noninterference and observational determinism.  ...  It was also supported by the German Research Foundation (DFG) as part of the Collaborative Research Center "Methods and Tools for Understanding and Controlling Privacy" (CRC 1223) and the Collaborative  ... 
doi:10.1109/csf49147.2020.00033 dblp:conf/csfw/BonakdarpourF20 fatcat:k53z74bbjzfa3pdf74w52b5rui

Hyper Static Analysis of Programs – An Abstract Interpretation-Based Framework for Hyperproperties Verification

Michele Pasqua, Isabella Mastroeni
2019 Zenodo  
The sound verification of hyperproperties is not trivial: it is not easy to adapt classic verification methods, used for trace properties, in order to deal with hyperproperties.  ...  In particular, the aim is to extend verification methods used for trace properties to the more general case of hyperproperties.  ...  Focusing on static program analysis for hyperproperties, there are still a lot of work to do.  ... 
doi:10.5281/zenodo.6584085 fatcat:gllzqtqscrgfhbce6cm3lw7gnq

HyperPCTL: A Temporal Logic for Probabilistic Hyperproperties [article]

Erika Abraham, Borzoo Bonakdarpour
2018 arXiv   pre-print
Such quantification allows expressing probabilistic hyperproperties. A model checking algorithm for the proposed logic is also given for discrete-time Markov chains.  ...  In this paper, we propose a new logic for expressing and reasoning about probabilistic hyperproperties. Hyperproperties characterize the relation between different independent executions of a system.  ...  Acknowledgments We thank Boris Köpf for his valuable insights on expressing QIF policies.  ... 
arXiv:1804.01853v1 fatcat:qpj2jormfvfpnhucsfmvop2saq

Synthesis in Uclid5 [article]

Federico Mora, Kevin Cheang, Elizabeth Polgreen, Sanjit A. Seshia
2020 arXiv   pre-print
To the best of our knowledge, the new version of Uclid5 is the only tool that supports program synthesis with bounded model checking, k-induction, sequential program verification, and hyperproperty verification  ...  We describe an integration of program synthesis into Uclid5, a formal modelling and verification tool.  ...  Acknowledgments This work was supported in part by NSF grants 1739816 and 1837132, a gift from Intel under the SCAP program, SRC Task 2867.001, and the iCyPhy center.  ... 
arXiv:2007.06760v2 fatcat:kacjofzizzf4hkxnb3ovwl63mq

On Strong Observational Refinement and Forward Simulation [article]

John Derrick, Simon Doherty, Brijesh Dongol, Gerhard Schellhorn, Heike Wehrheim
2021 arXiv   pre-print
Hyperproperties are correctness conditions for labelled transition systems that are more expressive than traditional trace properties, with particular relevance to security.  ...  Recently, Attiya and Enea studied a notion of strong observational refinement that preserves all hyperproperties.  ...  Clearly, for any scheduler S, the variable assignment of both threads will eventually occur. This "eventually" property can be expressed as a hyperproperty.  ... 
arXiv:2107.14509v1 fatcat:7ns2rqtvezahdl3clcv4uzgdya

HyperGI: Automated Detection and Repair of Information Flow Leakage

Ibrahim Mesecan, Daniel Blackwell, David Clark, Myra B. Cohen, Justyna Petke
2021 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE)  
We present our vision for HyperGI, a genetic improvement framework that detects, localizes and repairs information leakage.  ...  When programs do leak secrets there are no approaches to automatically repair them unless the leak causes a functional test to fail.  ...  Bounding QIF can be expressed as a hyperproperty [7] , [23] and has been shown to be PSPACEhard to verify for exact values [24] .  ... 
doi:10.1109/ase51524.2021.9678758 fatcat:uj26dw5xmrhg3h2yws5eh4pyzu

Facets of Software Doping [chapter]

Gilles Barthe, Pedro R. D'Argenio, Bernd Finkbeiner, Holger Hermanns
2016 Lecture Notes in Computer Science  
Furthermore, rigorous definitions will provide the necessary foundations for developing analysis methods (verification or testing) against doping.  ...  We expect that many definitions will fall in the general class of hyperproperties [15] informally, hyperproperties are sets of sets of program executions and capture behaviours of multiple runs of a program-which  ...  Notably, if the iOS designers would have had the particular intention to mistreat licensees who went elsewhere for repair, the same behaviour could well have qualified as software doping in the above sense  ... 
doi:10.1007/978-3-319-47169-3_46 fatcat:wyxzwca4qrc6pbciz72ujjouwu

HyperGI: Automated Detection and Repair of Information Flow Leakage [article]

Ibrahim Mesecan, Daniel Blackwell, David Clark, Myra B. Cohen, Justyna Petke
2021 arXiv   pre-print
We present our vision for HyperGI, a genetic improvement framework tha detects, localizes and repairs information leakage.  ...  When programs do leak secrets there are no approaches to automatically repair them unless the leak causes a functional test to fail.  ...  Bounding QIF can be expressed as a hyperproperty [7] , [23] and has been shown to be PSPACEhard to verify for exact values [24] .  ... 
arXiv:2108.12075v1 fatcat:yujf3iiy6zdu5fxllsdasmo6e4

Facets of Software Doping [article]

Gilles Barthe, Pedro R. D'Argenio, Bernd Finkbeiner, Holger Hermanns
2018 arXiv   pre-print
Furthermore, rigorous definitions will provide the necessary foundations for developing analysis methods (verification or testing) against doping.  ...  We expect that many definitions will fall in the general class of hyperproperties [15] informally, hyperproperties are sets of sets of program executions and capture behaviours of multiple runs of a program-which  ...  Notably, if the iOS designers would have had the particular intention to mistreat licensees who went elsewhere for repair, the same behaviour could well have qualified as software doping in the above sense  ... 
arXiv:1803.10154v1 fatcat:v72pk3dsrbdttp7243ycljdrau

Bounded Model Checking for Hyperproperties [article]

Tzu-Han Hsu, Cesar Sanchez, Borzoo Bonakdarpour
2020 arXiv   pre-print
This paper introduces a bounded model checking (BMC) algorithm for hyperproperties expressed in HyperLTL, which - to the best of our knowledge - is the first such algorithm.  ...  Hyperproperties are properties of systems that relate multiple computation traces, including security and concurrency properties.  ...  The synthesis problem for HyperLTL has been studied in problem in [3] in the form of program repair, in [4] in the form of controller synthesis, and in [18] for the general case.  ... 
arXiv:2009.08907v2 fatcat:ja7lqjcacjetdh6fpxeywi3h6q

UCLID5: Multi-Modal Formal Modeling, Verification, and Synthesis [article]

Elizabeth Polgreen, Kevin Cheang, Pranav Gaddamadugu, Adwait Godbole, Kevin Laeufer, Shaokai Lin, Yatin A. Manerkar, Federico Mora, Sanjit A. Seshia
2021 Zenodo  
This toolpaper presents new developments in the UCLID5 tool including new language features, integration with new techniques for syntax-guided synthesis and satisfiability solving, support for hyperproperties  ...  For instructions on how to set up, please see SETUP_README.md  ...  Acknowledgments: The UCLID5 project is grateful for the significant contributions by the late Pramod Subramanyan, one of the original creators of the tool.  ... 
doi:10.5281/zenodo.6557711 fatcat:si6njrzuorexhdskw4q4srzpeq

Weird Machines as Insecure Compilation [article]

Jennifer Paykin, Eric Mertens, Mark Tullsen, Luke Maurer, Benoît Razet, Alexander Bakst, Scott Moore
2019 arXiv   pre-print
This paper develops a framework for characterizing weird machines as insecure compilation, and illustrates the framework with examples of common exploits.  ...  We present a new view of weird machines based on techniques from programming languages theory and secure compilation.  ...  Can it be repaired and if so, how effective is a proposed mitigation?  ... 
arXiv:1911.00157v1 fatcat:df7hkxtboregxmephiwnvaryia

Realizing $$\omega $$-regular Hyperproperties [chapter]

Bernd Finkbeiner, Christopher Hahn, Jana Hofmann, Leander Tentrup
2020 Lecture Notes in Computer Science  
At the same time, we argued that the expressiveness of HyperQPTL is optimal in a sense that a more expressive logic for ω-regular hyperproperties would have an undecidable model checking problem.  ...  We showed that realizability is decidable for HyperQPTL fragments that contain properties like promptness.  ...  HyperLTL has been successfully applied in (runtime) verification, (e.g., [15, 21, 32] ), specification analysis [11, 14] , synthesis [12, 13] , and program repair [1] of hyperproperties.  ... 
doi:10.1007/978-3-030-53291-8_4 fatcat:nx45so3bxnb2zgubj4anbr77t4

Bounded Model Checking for Hyperproperties [chapter]

Tzu-Han Hsu, César Sánchez, Borzoo Bonakdarpour
2021 Lecture Notes in Computer Science  
AbstractThis paper introduces a bounded model checking (BMC) algorithm for hyperproperties expressed in HyperLTL, which — to the best of our knowledge — is the first such algorithm.  ...  BMC for LTL is reduced to SAT solving, because LTL describes a property via inspecting individual traces.  ...  The synthesis problem for HyperLTL has been studied in [3] in the form of program repair, in [4] in the form of controller synthesis, and in [18] for the general case.  ... 
doi:10.1007/978-3-030-72016-2_6 fatcat:b34e6gt6lrchhcfrg5wtbxphha

Is your software on dope? Formal analysis of surreptitiously "enhanced" programs [article]

Pedro R. D'Argenio, Gilles Barthe, Sebastian Biewer, Bernd Finkbeiner, Holger Hermanns
2017 arXiv   pre-print
We exemplify this by applying self-composition on sequential programs and model checking of HyperLTL formulas on reactive models.  ...  Moreover, we show that these characterisations provide an immediate framework for analysis by using already existing verification techniques.  ...  We would like to thank the Dependable Systems and Software Group (Saarland University) for a fruitful discussion during an early presentation of this work, and Nicolás Wolovick for drawing our attention  ... 
arXiv:1702.04693v1 fatcat:gjzhvrucxjbidhnyxezo3kstea
« Previous Showing results 1 — 15 out of 45 results