Skip to main content

Monitoring Hyperproperties with Circuits

  • Conference paper
  • First Online:
Formal Techniques for Distributed Objects, Components, and Systems (FORTE 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13273))

  • 358 Accesses

Abstract

This paper presents an extension of the safety fragment of Hennessy-Milner Logic with recursion over sets of traces, in the spirit of Hyper-LTL. It then introduces a novel monitoring setup that employs circuit-like structures to combine verdicts from regular monitors. The main contribution of this study is the definition of the monitors and their semantics, as well as a monitor-synthesis procedure from formulae in the logic that yields ‘circuit-like monitors’ that are sound and violation complete over a finite set of infinite traces.

The authors were supported by the projects ‘Open Problems in the Equational Logic of Processes’ (OPEL) (grant No 196050–051) and ‘Mode(l)s of Verification and Monitorability’ (MoVeMent) (grant No 217987) of the Icelandic Research Fund, and ‘Runtime and Equational Verification of Concurrent Programs’ (ReVoCoP) (grant No 222021), of the Reykjavik University Research Fund. Luca Aceto’s work was also partially supported by the Italian MIUR PRIN 2017 project FTXR7S IT MATTERS ‘Methods and Tools for Trustworthy Smart Systems’.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aceto, L., Achilleos, A., Francalanza, A., Ingólfsdóttir, A., Lehtinen, K.: Adventures in monitorability: from branching to linear time and back again. Proc. ACM Program. Lang. POPL 3(52), 1–29 (2019)

    Google Scholar 

  2. Agrawal, S., Bonakdarpour, B.: Runtime verification of k-safety hyperproperties in HyperLTL. In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27–July 1, 2016, pp. 239–252. IEEE Computer Society (2016)

    Google Scholar 

  3. Alpern, B., Schneider, F.B.: Recognizing safety and liveness. Distrib. Comput. 2(3), 117–126 (1987)

    Article  Google Scholar 

  4. Bartocci, E., Falcone, Y., Francalanza, A., Reger, G.: Introduction to runtime verification. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 1–33. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-75632-5_1

    Chapter  Google Scholar 

  5. Bocchi, L., Honda, K., Tuosto, E., Yoshida, N.: A theory of design-by-contract for distributed multiparty interactions. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 162–176. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15375-4_12

    Chapter  MATH  Google Scholar 

  6. Bonakdarpour, B., Finkbeiner, B.: The complexity of monitoring hyperproperties. In: 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9–12, 2018, pp. 162–174. IEEE Computer Society (2018)

    Google Scholar 

  7. Cassar, I., Francalanza, A., Mezzina, C.A., Tuosto, E.: Reliability and fault-tolerance by choreographic design. In: Francalanza, A., Pace, G.J. (eds.), Proceedings Second International Workshop on Pre- and Post-Deployment Verification Techniques, PrePost@iFM 2017, Torino, Italy, 19 September 2017, vol. 254 of EPTCS, pp. 69–80 (2017)

    Google Scholar 

  8. Clarkson, M.R., Finkbeiner, B., Koleini, M., Micinski, K.K., Rabe, M.N., Sánchez, C.: Temporal logics for hyperproperties. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol. 8414, pp. 265–284. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54792-8_15

    Chapter  Google Scholar 

  9. Clarkson, M.R., Schneider, F.B.: Hyperproperties. J. Comput. Secur. 18(6), 1157–1210 (2010)

    Article  Google Scholar 

  10. van Ditmarsch, H., van der Hoek, W., Kooi, B.: Dynamic Epistemic Logic, 1st edn. Springer, Dordrecht (2007). https://doi.org/10.1007/978-1-4020-5839-4

    Book  MATH  Google Scholar 

  11. Finkbeiner, B., Hahn, C., Stenger, M., Tentrup, L.: Monitoring hyperproperties. Formal Methods Syst. Des. 54(3), 336–363 (2019)

    Article  Google Scholar 

  12. Francalanza, A., et al.: A foundation for runtime monitoring. In: Lahiri, S., Reger, G. (eds.) RV 2017. LNCS, vol. 10548, pp. 8–29. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67531-2_2

    Chapter  Google Scholar 

  13. Francalanza, A., Aceto, L., Ingólfsdóttir, A.: Monitorability for the hennessy-milner logic with recursion. Formal Methods Syst. Des. 51(1), 87–116 (2017)

    Article  Google Scholar 

  14. Håstad, J.: Computational Limitations of Small-Depth Circuits, vol. 53. MIT Press, Cambridge (1987)

    Google Scholar 

  15. McLean, J.: A general theory of composition for a class of “possibilistic” properties. IEEE Trans. Softw. Eng. 22(1), 53–67 (1996)

    Article  Google Scholar 

  16. Mezzina, C.A., Pérez, J.A.: Causally consistent reversible choreographies: a monitors-as-memories approach. In: Proceedings of the 19th International Symposium on Principles and Practice of Declarative Programming, PPDP 2017, pp. 127–138, New York, Association for Computing Machinery (2017)

    Google Scholar 

  17. Rabin, M.O.: Real time computation. Israel J. Math. 1(4), 203–211 (1963)

    Article  MathSciNet  Google Scholar 

  18. Vollmer, H.: Introduction to Circuit Complexity - A Uniform Approach. Texts in Theoretical Computer Science. An EATCS Series. Springer, New York (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elli Anastasiadi .

Editor information

Editors and Affiliations

A Appendix: Cases for the Proof of Violation Completeness

A Appendix: Cases for the Proof of Violation Completeness

Here we give some more insight on the remaining cases of the violation completeness proof. First we highlight that the second base case of our proof, for formulae of the form \(\forall _{\pi } \psi \) is completely analogous to the one we give and thus omitted.

We will here give an important lemma necessary for analyzing both remaining cases, and then present the high level details for the case of \(\sqcap \). The intuition of the importance of the lemma is that the monitors \(Syn(\varphi _1)\) and \(Syn(\varphi _2)\) should not have their computation affected from the fact that they are run in parallel over a set of traces T.

Lemma 1

If

  • \(s_{M_1} \triangleleft \overrightarrow{m_1}[i] \triangleleft T\rightarrow s_{M_1}'\triangleleft \overrightarrow{m_1}[i]' \triangleleft T'\), and

  • \(s_{M_2} \triangleleft \overrightarrow{m_2}[i] \triangleleft T\rightarrow s_{M_2}'\triangleleft \overrightarrow{m_2}[i]' \triangleleft T'\)

then

  • \(s_{M_1 \vee M_2} \triangleleft \overrightarrow{m_{12}}[i] \triangleleft T\rightarrow s_{M_1 \wedge M_2}' \triangleleft \overrightarrow{m_{12}}[i]' \triangleleft T'\), and

  • \(s_{M_1 \wedge M_2} \triangleleft \overrightarrow{m_{12}}[i] \triangleleft T\rightarrow s_{M_1 \wedge M_2}' \triangleleft \overrightarrow{m_{12}}[i]' \triangleleft T'\),

where \(\overrightarrow{m_{12}} = \overrightarrow{m_{2}} \cup \overrightarrow{m_{2}}\) and \(\overrightarrow{m_{12}}' = \overrightarrow{m_{2}}' \cup \overrightarrow{m_{2}}'\) respectively.

Proof

We note here that a configuration for \(s_{M_1 \vee M_2}\) is identical to one for \(s_{M_1 \wedge M_2}\) except the root variable, as all other variables they both contain are \(s_{M_1}' \cup s_{M_2}'\).

The key aspect of this proof is the third rule of the instrumentation relation. There we can see that in order for a configuration instrumented over a set of regular monitors, instrumented over a set of traces, can only advance its computation, if all monitors instrumented over the same trace progress with their computation synchronously by reading the next trace event.

Thus, form the assumptions of this lemma we get that for all \(j = \{1,\ldots r\}\), where r is the total amount of different regular monitors occurring in \(M_1\) and \(M_2\) the premise of our rule is satisfied and thus the cumulative configuration of variables amounting for the union of variables of the two circuit monitors \(M_1\) and \(M_2\) (including the root variable), can perform the necessary transition to the new state, where all regular monitors (those both from \(M_1\) and \(M_2\)) assigned to trace \(t_i\) have processed the event a, and we are done.    \(\square \)

Having the above lemma streamlines our inductive step for the rest of the cases. Assuming a non-base-case formula in Hyper \(^1\)-sHML we can clearly see that it must be of the form \(\varphi = \varphi _1 \sqcap \varphi _2\) or \(\varphi = \varphi _1 \sqcap \varphi _2\). We only analyze one of the two cases as they are symmetrical. For any set of traces T, such that , from the semantics of Hyper \(^1\)-sHML, we have that and . Since the synthesized monitor for \(\varphi _1 \sqcap \varphi _2\) can reach a configuration where the values of the gates for \(Syn(\varphi _1)\) and \(Syn(\varphi _2)\) are the same as they would be for the individual monitors instrumented over T, and by inductive hypothesis (which guarantees that \(Syn(\varphi _1)\) and \(Syn(\varphi _2)\) are violation-complete) we have necessary conclusion by combining the two negative verdicts of the individual monitors via the semantics.    \(\square \)

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aceto, L., Achilleos, A., Anastasiadi, E., Francalanza, A. (2022). Monitoring Hyperproperties with Circuits. In: Mousavi, M.R., Philippou, A. (eds) Formal Techniques for Distributed Objects, Components, and Systems. FORTE 2022. Lecture Notes in Computer Science, vol 13273. Springer, Cham. https://doi.org/10.1007/978-3-031-08679-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-08679-3_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08678-6

  • Online ISBN: 978-3-031-08679-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics