Model Checking Time Window Temporal Logic for Hyperproperties

08/02/2023
by   Ernest Bonnah, et al.
0

Hyperproperties extend trace properties to express properties of sets of traces, and they are increasingly popular in specifying various security and performance-related properties in domains such as cyber-physical systems, smart grids, and automotive. This paper introduces a model checking algorithm for a new formalism, HyperTWTL, which extends Time Window Temporal Logic (TWTL) – a domain-specific formal specification language for robotics, by allowing explicit and simultaneous quantification over multiple execution traces. We present HyperTWTL with both synchronous and asynchronous semantics, based on the alignment of the timestamps in the traces. Consequently, we demonstrate the application of HyperTWTL in formalizing important information-flow security policies and concurrency for robotics applications. Finally, we propose a model checking algorithm for verifying fragments of HyperTWTL by reducing the problem to a TWTL model checking problem.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/26/2021

Asynchronous Extensions of HyperLTL

Hyperproperties are a modern specification paradigm that extends trace p...
research
01/26/2023

AutoHyper: Explicit-State Model Checking for HyperLTL

HyperLTL is a temporal logic that can express hyperproperties, i.e., pro...
research
01/09/2022

A systematic literature review on counterexample explanation

Context: Safety is of paramount importance for cyber-physical systems in...
research
09/25/2020

Trace-Checking CPS Properties: Bridging the Cyber-Physical Gap

Cyber-physical systems combine software and physical components. Specifi...
research
05/31/2019

Model Checking Quantitative Hyperproperties

Hyperproperties are properties of sets of computation traces. In this pa...
research
05/29/2023

Second-Order Hyperproperties

We introduce Hyper^2LTL, a temporal logic for the specification of hyper...
research
01/17/2023

Bounded Model Checking for Asynchronous Hyperproperties

Many types of attacks on confidentiality stem from the nondeterministic ...

Please sign up or login with your details

Forgot password? Click here to reset