2018
DOI: 10.1007/978-3-319-89963-3_11
|View full text |Cite
|
Sign up to set email alerts
|

$$\text {RVHyper}$$ RVHyper : A Runtime Verification Tool for Temporal Hyperproperties

Abstract: Abstract. We present RVHyper, a runtime verification tool for hyperproperties. Hyperproperties, such as non-interference and observational determinism, relate multiple computation traces with each other. Specifications are given as formulas in the temporal logic HyperLTL, which extends linear-time temporal logic (LTL) with trace quantifiers and trace variables. RVHyper processes execution traces sequentially until a violation of the specification is detected. In this case, a counter example, in the form of a s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
52
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
1

Relationship

4
2

Authors

Journals

citations
Cited by 40 publications
(52 citation statements)
references
References 7 publications
0
52
0
Order By: Relevance
“…5, we evaluate RVHyper with a focus on the novel storage optimization technique using our tree data structure. This is a revised and extended version of a paper that appeared at TACAS 2018 [23]. Our contribution and extension compared to [23] is the inclusion of a new trace storage optimization technique presented in Sect.…”
Section: Structure Of This Articlementioning
confidence: 99%
See 3 more Smart Citations
“…5, we evaluate RVHyper with a focus on the novel storage optimization technique using our tree data structure. This is a revised and extended version of a paper that appeared at TACAS 2018 [23]. Our contribution and extension compared to [23] is the inclusion of a new trace storage optimization technique presented in Sect.…”
Section: Structure Of This Articlementioning
confidence: 99%
“…They generalize trace properties in that they not only check the correctness of individual computation traces in isolation, but relate multiple computation traces to each other. Exam-ples include information flow policies, such as observational determinism [33,34,42], (quantitative) non-interference [33,36,41] as well as symmetry [26] and spurious dependencies in hardware designs [23], error correcting codes [26], and anti-doping of automotive software [14].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, we extend the bounded synthesis approach to HyperLTL formulas with quantifier alternation. Beyond the model checking and synthesis problems, the satisfiability [11,12,14] and monitoring [15,16,22] problems of HyperLTL have also been studied in the past.…”
Section: Introductionmentioning
confidence: 99%