Synthesis from hyperproperties

被引:0
|
作者
Bernd Finkbeiner
Christopher Hahn
Philip Lukert
Marvin Stenger
Leander Tentrup
机构
[1] Saarland University,Reactive Systems Group
来源
Acta Informatica | 2020年 / 57卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
We study the reactive synthesis problem for hyperproperties given as formulas of the temporal logic HyperLTL. Hyperproperties generalize trace properties, i.e., sets of traces, to sets of sets of traces. Typical examples are information-flow policies like noninterference, which stipulate that no sensitive data must leak into the public domain. Such properties cannot be expressed in standard linear or branching-time temporal logics like LTL, CTL, or CTL∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\hbox {CTL}^*$$\end{document}. Furthermore, HyperLTL subsumes many classical extensions of the LTL realizability problem, including realizability under incomplete information, distributed synthesis, and fault-tolerant synthesis. We show that, while the synthesis problem is undecidable for full HyperLTL, it remains decidable for the ∃∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\exists ^*$$\end{document}, ∃∗∀1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\exists ^*\forall ^1$$\end{document}, and the linear∀∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${{ linear }}\;\forall ^*$$\end{document} fragments. Beyond these fragments, the synthesis problem immediately becomes undecidable. For universal HyperLTL, we present a semi-decision procedure that constructs implementations and counterexamples up to a given bound. We report encouraging experimental results obtained with a prototype implementation on example specifications with hyperproperties like symmetric responses, secrecy, and information flow.
引用
收藏
页码:137 / 163
页数:26
相关论文
共 50 条
  • [21] The Complexity of Monitoring Hyperproperties
    Bonakdarpour, Borzoo
    Finkbeiner, Bernd
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 162 - 174
  • [22] Verifying Hyperproperties With TLA
    Lamport, Leslie
    Schneider, Fred B.
    2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 650 - 665
  • [23] Probabilistic Hyperproperties with Nondeterminism
    Abraham, Erika
    Bartocci, Ezio
    Bonakdarpour, Borzoo
    Dobe, Oyendrila
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2020), 2020, 12302 : 518 - 534
  • [24] Realizing ω-regular Hyperproperties
    Finkbeiner, Bernd
    Hahn, Christopher
    Hofmann, Jana
    Tentrup, Leander
    COMPUTER AIDED VERIFICATION, PT II, 2020, 12225 : 40 - 63
  • [25] Mutation testing with hyperproperties
    Fellner, Andreas
    Tabaei Befrouei, Mitra
    Weissenbacher, Georg
    SOFTWARE AND SYSTEMS MODELING, 2021, 20 (02): : 405 - 427
  • [26] Monitorable hyperproperties of nonterminating systems
    Damanafshan, Morteza
    Fallah, Mehran S.
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2022, 128
  • [27] Towards Incrementalization of Holistic Hyperproperties
    Milushev, Dimiter
    Clarke, Dave
    PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 329 - 348
  • [28] Second-Order Hyperproperties
    Beutner, Raven
    Finkbeiner, Bernd
    Frenkel, Hadar
    Metzger, Niklas
    COMPUTER AIDED VERIFICATION, CAV 2023, PT II, 2023, 13965 : 309 - 332
  • [29] SemPat: From Hyperproperties to Attack Patterns for Scalable Analysis of Microarchitectural Security
    Godbole, Adwait
    Manerkar, Yatin A.
    Seshia, Sanjit A.
    PROCEEDINGS OF THE 2024 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2024, 2024, : 2756 - 2770
  • [30] A Temporal Logic for Asynchronous Hyperproperties
    Baumeister, Jan
    Coenen, Norine
    Bonakdarpour, Borzoo
    Finkbeiner, Bernd
    Sanchez, Cesar
    COMPUTER AIDED VERIFICATION (CAV 2021), PT I, 2021, 12759 : 694 - 717