Temporal logics for hyperproperties

MR Clarkson, B Finkbeiner, M Koleini… - … 2014, Held as Part of the …, 2014 - Springer
Two new logics for verification of hyperproperties are proposed. Hyperproperties
characterize security policies, such as noninterference, as a property of sets of computation …

Algorithms for model checking HyperLTL and HyperCTL

B Finkbeiner, MN Rabe, C Sánchez - International Conference on …, 2015 - Springer
We present an automata-based algorithm for checking finite state systems for
hyperproperties specified in HyperLTL and HyperCTL^*. For the alternation-free fragments …

Verifying hyperliveness

N Coenen, B Finkbeiner, C Sánchez… - … York City, NY, USA, July 15 …, 2019 - Springer
HyperLTL is an extension of linear-time temporal logic for the specification of
hyperproperties, ie, temporal properties that relate multiple computation traces. HyperLTL …

Encover: Symbolic exploration for information flow security

M Balliu, M Dam, G Le Guernic - 2012 IEEE 25th Computer …, 2012 - ieeexplore.ieee.org
We address the problem of program verification for information flow policies by means of
symbolic execution and model checking. Noninterference-like security policies are …

Efficient coalgebraic partition refinement

U Dorsch, S Milius, L Schröder, T Wißmann - arXiv preprint arXiv …, 2017 - arxiv.org
We present a generic partition refinement algorithm that quotients coalgebraic systems by
behavioural equivalence, an important task in reactive verification; coalgebraic generality …

Model checking algorithms for hyperproperties

B Finkbeiner - … Conference on Verification, Model Checking, and …, 2021 - Springer
Hyperproperties generalize trace properties by expressing relations between multiple
computations. Hyperpropertes include policies from information-flow security, like …

Model checking the information flow security of real-time systems

C Gerking, D Schubert, E Bodden - … , ESSoS 2018, Paris, France, June 26 …, 2018 - Springer
Cyber-physical systems are processing large amounts of sensitive information, but are
increasingly often becoming the target of cyber attacks. Thus, it is essential to verify the …

Control and synthesis of non-interferent timed systems

G Benattar, F Cassez, D Lime… - International Journal of …, 2015 - Taylor & Francis
We focus on the control and the synthesis of secure timed systems which are modelled as
timed automata. The security property that the system must satisfy is a non-interference …

[PDF][PDF] Efficient and modular coalgebraic partition refinement

T Wißmann, U Dorsch, S Milius… - Logical Methods in …, 2020 - lmcs.episciences.org
We present a generic partition refinement algorithm that quotients coalgebraic systems by
behavioural equivalence, an important task in system analysis and verification. Coalgebraic …

Mutation testing with hyperproperties

A Fellner, M Tabaei Befrouei… - Software and Systems …, 2021 - Springer
We present a new method for model-based mutation-driven test case generation. Mutants
are generated by making small syntactical modifications to the model or source code of the …