We develop the first language-based, Privacy by Design approach that provides support for a rich class of privacy policies. The policies are user-defined, rather than programmer …
E Albert, S Grossman, N Rinetzky… - Proceedings of the …, 2020 - dl.acm.org
Callbacks are an effective programming discipline for implementing event-driven programming, especially in environments like Ethereum which forbid shared global state …
This paper introduces a bounded model checking (BMC) algorithm for hyperproperties expressed in HyperLTL, which—to the best of our knowledge—is the first such algorithm …
JO Gutsfeld, M Müller-Olm, C Ohrem - Proceedings of the ACM on …, 2021 - dl.acm.org
Hyperproperties have received increasing attention in the last decade due to their importance eg for security analyses. Past approaches have focussed on synchronous …
We study the reactive synthesis problem for hyperproperties given as formulas of the temporal logic HyperLTL. Hyperproperties generalize trace properties, ie, sets of traces, to …
Software components are expected to communicate according to predetermined protocols and APIs. Numerous methods have been proposed to check the correctness of …
System requirements related to concepts like information flow, knowledge, and robustness cannot be judged in terms of individual system executions, but rather require an analysis of …
Hyperproperties are properties that relate multiple execution traces. Previous work on monitoring hyperproperties focused on synchronous hyperproperties, usually specified in …
Hyperproperties relate multiple computation traces to each other. Model checkers for hyperproperties thus return, in case a system model violates the specification, a set of traces …