FM '09 Proceedings of the 2nd World Congress on Formal Methods
Deductive verification of cryptographic software
Innovations in Systems and Software Engineering
Formalization of smart metering requirements
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
On bounding problems of quantitative information flow
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Abstract certification of global non-interference in rewriting logic
FMCO'09 Proceedings of the 8th international conference on Formal methods for components and objects
Transactions on computational science XI
Relational verification using product programs
FM'11 Proceedings of the 17th international conference on Formal methods
Secure information flow by self-composition
Mathematical Structures in Computer Science - Programming Language Interference and Dependence
Towards incrementalization of holistic hyperproperties
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Coinductive unwinding of security-relevant hyperproperties
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Knowledge inference for optimizing secure multi-party computation
Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security
On bounding problems of quantitative information flow
Journal of Computer Security - ESORICS 2010
Journal of Computer Security - CSF 2010
Hi-index | 0.00 |
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperties, introduced here, are sets of properties. Hyperproperties can express security policies, such as secure information flow, that properties cannot. Safety and liveness are generalized to hyperproperties, and every hyperproperty is shown to be the intersection of a safety hyperproperty and a liveness hyperproperty. A verification technique for safety hyperproperties is given and is shown to generalize prior techniques for verifying secure information flow. Refinement is shown to be valid for safety hyperproperties. A topological characterization of hyperproperties is given.