Abstract
This paper presents an extension of the safety fragment of Hennessy-Milner Logic with recursion over sets of traces, in the spirit of Hyper-LTL. It then introduces a novel monitoring setup that employs circuit-like structures to combine verdicts from regular monitors. The main contribution of this study is the definition of the monitors and their semantics, as well as a monitor-synthesis procedure from formulae in the logic that yields ‘circuit-like monitors’ that are sound and violation complete over a finite set of infinite traces.
The authors were supported by the projects ‘Open Problems in the Equational Logic of Processes’ (OPEL) (grant No 196050–051) and ‘Mode(l)s of Verification and Monitorability’ (MoVeMent) (grant No 217987) of the Icelandic Research Fund, and ‘Runtime and Equational Verification of Concurrent Programs’ (ReVoCoP) (grant No 222021), of the Reykjavik University Research Fund. Luca Aceto’s work was also partially supported by the Italian MIUR PRIN 2017 project FTXR7S IT MATTERS ‘Methods and Tools for Trustworthy Smart Systems’.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aceto, L., Achilleos, A., Francalanza, A., Ingólfsdóttir, A., Lehtinen, K.: Adventures in monitorability: from branching to linear time and back again. Proc. ACM Program. Lang. POPL 3(52), 1–29 (2019)
Agrawal, S., Bonakdarpour, B.: Runtime verification of k-safety hyperproperties in HyperLTL. In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27–July 1, 2016, pp. 239–252. IEEE Computer Society (2016)
Alpern, B., Schneider, F.B.: Recognizing safety and liveness. Distrib. Comput. 2(3), 117–126 (1987)
Bartocci, E., Falcone, Y., Francalanza, A., Reger, G.: Introduction to runtime verification. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 1–33. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-75632-5_1
Bocchi, L., Honda, K., Tuosto, E., Yoshida, N.: A theory of design-by-contract for distributed multiparty interactions. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 162–176. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15375-4_12
Bonakdarpour, B., Finkbeiner, B.: The complexity of monitoring hyperproperties. In: 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9–12, 2018, pp. 162–174. IEEE Computer Society (2018)
Cassar, I., Francalanza, A., Mezzina, C.A., Tuosto, E.: Reliability and fault-tolerance by choreographic design. In: Francalanza, A., Pace, G.J. (eds.), Proceedings Second International Workshop on Pre- and Post-Deployment Verification Techniques, PrePost@iFM 2017, Torino, Italy, 19 September 2017, vol. 254 of EPTCS, pp. 69–80 (2017)
Clarkson, M.R., Finkbeiner, B., Koleini, M., Micinski, K.K., Rabe, M.N., Sánchez, C.: Temporal logics for hyperproperties. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol. 8414, pp. 265–284. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54792-8_15
Clarkson, M.R., Schneider, F.B.: Hyperproperties. J. Comput. Secur. 18(6), 1157–1210 (2010)
van Ditmarsch, H., van der Hoek, W., Kooi, B.: Dynamic Epistemic Logic, 1st edn. Springer, Dordrecht (2007). https://doi.org/10.1007/978-1-4020-5839-4
Finkbeiner, B., Hahn, C., Stenger, M., Tentrup, L.: Monitoring hyperproperties. Formal Methods Syst. Des. 54(3), 336–363 (2019)
Francalanza, A., et al.: A foundation for runtime monitoring. In: Lahiri, S., Reger, G. (eds.) RV 2017. LNCS, vol. 10548, pp. 8–29. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67531-2_2
Francalanza, A., Aceto, L., Ingólfsdóttir, A.: Monitorability for the hennessy-milner logic with recursion. Formal Methods Syst. Des. 51(1), 87–116 (2017)
Håstad, J.: Computational Limitations of Small-Depth Circuits, vol. 53. MIT Press, Cambridge (1987)
McLean, J.: A general theory of composition for a class of “possibilistic” properties. IEEE Trans. Softw. Eng. 22(1), 53–67 (1996)
Mezzina, C.A., Pérez, J.A.: Causally consistent reversible choreographies: a monitors-as-memories approach. In: Proceedings of the 19th International Symposium on Principles and Practice of Declarative Programming, PPDP 2017, pp. 127–138, New York, Association for Computing Machinery (2017)
Rabin, M.O.: Real time computation. Israel J. Math. 1(4), 203–211 (1963)
Vollmer, H.: Introduction to Circuit Complexity - A Uniform Approach. Texts in Theoretical Computer Science. An EATCS Series. Springer, New York (1999)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Appendix: Cases for the Proof of Violation Completeness
A Appendix: Cases for the Proof of Violation Completeness
Here we give some more insight on the remaining cases of the violation completeness proof. First we highlight that the second base case of our proof, for formulae of the form \(\forall _{\pi } \psi \) is completely analogous to the one we give and thus omitted.
We will here give an important lemma necessary for analyzing both remaining cases, and then present the high level details for the case of \(\sqcap \). The intuition of the importance of the lemma is that the monitors \(Syn(\varphi _1)\) and \(Syn(\varphi _2)\) should not have their computation affected from the fact that they are run in parallel over a set of traces T.
Lemma 1
If
-
\(s_{M_1} \triangleleft \overrightarrow{m_1}[i] \triangleleft T\rightarrow s_{M_1}'\triangleleft \overrightarrow{m_1}[i]' \triangleleft T'\), and
-
\(s_{M_2} \triangleleft \overrightarrow{m_2}[i] \triangleleft T\rightarrow s_{M_2}'\triangleleft \overrightarrow{m_2}[i]' \triangleleft T'\)
then
-
\(s_{M_1 \vee M_2} \triangleleft \overrightarrow{m_{12}}[i] \triangleleft T\rightarrow s_{M_1 \wedge M_2}' \triangleleft \overrightarrow{m_{12}}[i]' \triangleleft T'\), and
-
\(s_{M_1 \wedge M_2} \triangleleft \overrightarrow{m_{12}}[i] \triangleleft T\rightarrow s_{M_1 \wedge M_2}' \triangleleft \overrightarrow{m_{12}}[i]' \triangleleft T'\),
where \(\overrightarrow{m_{12}} = \overrightarrow{m_{2}} \cup \overrightarrow{m_{2}}\) and \(\overrightarrow{m_{12}}' = \overrightarrow{m_{2}}' \cup \overrightarrow{m_{2}}'\) respectively.
Proof
We note here that a configuration for \(s_{M_1 \vee M_2}\) is identical to one for \(s_{M_1 \wedge M_2}\) except the root variable, as all other variables they both contain are \(s_{M_1}' \cup s_{M_2}'\).
The key aspect of this proof is the third rule of the instrumentation relation. There we can see that in order for a configuration instrumented over a set of regular monitors, instrumented over a set of traces, can only advance its computation, if all monitors instrumented over the same trace progress with their computation synchronously by reading the next trace event.
Thus, form the assumptions of this lemma we get that for all \(j = \{1,\ldots r\}\), where r is the total amount of different regular monitors occurring in \(M_1\) and \(M_2\) the premise of our rule is satisfied and thus the cumulative configuration of variables amounting for the union of variables of the two circuit monitors \(M_1\) and \(M_2\) (including the root variable), can perform the necessary transition to the new state, where all regular monitors (those both from \(M_1\) and \(M_2\)) assigned to trace \(t_i\) have processed the event a, and we are done. \(\square \)
Having the above lemma streamlines our inductive step for the rest of the cases. Assuming a non-base-case formula in Hyper \(^1\)-sHML we can clearly see that it must be of the form \(\varphi = \varphi _1 \sqcap \varphi _2\) or \(\varphi = \varphi _1 \sqcap \varphi _2\). We only analyze one of the two cases as they are symmetrical. For any set of traces T, such that , from the semantics of Hyper \(^1\)-sHML, we have that
and
. Since the synthesized monitor for \(\varphi _1 \sqcap \varphi _2\) can reach a configuration where the values of the gates for \(Syn(\varphi _1)\) and \(Syn(\varphi _2)\) are the same as they would be for the individual monitors instrumented over T, and by inductive hypothesis (which guarantees that \(Syn(\varphi _1)\) and \(Syn(\varphi _2)\) are violation-complete) we have necessary conclusion by combining the two negative verdicts of the individual monitors via the semantics. \(\square \)
Rights and permissions
Copyright information
© 2022 IFIP International Federation for Information Processing
About this paper
Cite this paper
Aceto, L., Achilleos, A., Anastasiadi, E., Francalanza, A. (2022). Monitoring Hyperproperties with Circuits. In: Mousavi, M.R., Philippou, A. (eds) Formal Techniques for Distributed Objects, Components, and Systems. FORTE 2022. Lecture Notes in Computer Science, vol 13273. Springer, Cham. https://doi.org/10.1007/978-3-031-08679-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-08679-3_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-08678-6
Online ISBN: 978-3-031-08679-3
eBook Packages: Computer ScienceComputer Science (R0)