In online monitoring, we first synthesize a monitor from a formal
specif...
Blockchain technologies are facing a scalability challenge, which must b...
We study the problem of monitoring distributed systems where computers
c...
Many types of attacks on confidentiality stem from the nondeterministic
...
Bounded model checking (BMC) is an effective technique for hunting bugs ...
Blockchains are maintained by a network of participants that run algorit...
Runtime Verification deals with the question of whether a run of a syste...
Hyperproperties are properties of systems that relate different executio...
Blockchains are modern distributed systems that provide decentralized
fi...
Blockchain technologies are facing a scalability challenge, which must b...
We introduce a tableau decision method for deciding realizability of
spe...
This paper presents HyperQube, a push-button QBF-based bounded model che...
Hyperproperties are properties of computational systems that require mor...
Hyperproperties are a modern specification paradigm that extends trace
p...
This paper introduces the first bounded model checking (BMC) algorithm f...
HyperLTL is an extension of linear-time temporal logic for the specifica...
Stream Runtime Verification is a formal dynamic analysis technique that
...
Runtime Verification (RV) studies how to analyze execution traces of a s...
Many important system properties, particularly in security and privacy,
...
This report presents the activities of the first working group of the CO...
Runtime verification is an area of formal methods that studies the dynam...
Container technologies, like Docker, are becoming increasingly popular.
...