{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T07:46:01Z","timestamp":1766043961425,"version":"3.48.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032054340"},{"type":"electronic","value":"9783032054357"}],"license":[{"start":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T00:00:00Z","timestamp":1757635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T00:00:00Z","timestamp":1757635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05435-7_23","type":"book-chapter","created":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T01:30:54Z","timestamp":1757727054000},"page":"417-437","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Monitoring Hypernode Logic Over Infinite Domains"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1132-5516","authenticated-orcid":false,"given":"Marek","family":"Chalupa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2985-7724","authenticated-orcid":false,"given":"Thomas A.","family":"Henzinger","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Oliveira da Costa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,12]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","unstructured":"Aceto, L., Achilleos, A., Anastasiadi, E., Francalanza, A.: Monitoring hyperproperties with circuits. In: Proceedings of Formal Techniques for Distributed Objects, Components, and Systems (FORTE 2022). LNCS, vol. 13273, pp. 1\u201310. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-08679-3_1","DOI":"10.1007\/978-3-031-08679-3_1"},{"key":"23_CR2","doi-asserted-by":"publisher","unstructured":"Agrawal, S., Bonakdarpour, B.: Runtime verification of k-safety hyperproperties in HyperLTL. In: IEEE 29th Computer Security Foundations Symposium (CSF 2016), pp. 239\u2013252 (2016). https:\/\/doi.org\/10.1109\/CSF.2016.24","DOI":"10.1109\/CSF.2016.24"},{"key":"23_CR3","doi-asserted-by":"publisher","unstructured":"Bartocci, E., Henzinger, T.A., Nickovic, D., da\u00a0Costa, A.O.: Hypernode automata. In: 34th International Conference on Concurrency Theory, (CONCUR 2023). LIPIcs, vol.\u00a0279, pp. 21:1\u201321:16. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2023). https:\/\/doi.org\/10.4230\/LIPICS.CONCUR.2023.21","DOI":"10.4230\/LIPICS.CONCUR.2023.21"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1007\/978-3-030-81685-8_33","volume-title":"Computer Aided Verification","author":"J Baumeister","year":"2021","unstructured":"Baumeister, J., Coenen, N., Bonakdarpour, B., Finkbeiner, B., S\u00e1nchez, C.: A temporal logic for asynchronous hyperproperties. In: Silva, A., Leino, K.R.M. (eds.) CAV 2021. LNCS, vol. 12759, pp. 694\u2013717. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81685-8_33"},{"key":"23_CR5","doi-asserted-by":"publisher","unstructured":"Beutner, R., Finkbeiner, B.: A temporal logic for strategic hyperproperties. In: 32nd International Conference on Concurrency Theory, (CONCUR 2021). LIPIcs, vol.\u00a0203, pp. 24:1\u201324:19. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2021). https:\/\/doi.org\/10.4230\/LIPICS.CONCUR.2021.24","DOI":"10.4230\/LIPICS.CONCUR.2021.24"},{"key":"23_CR6","doi-asserted-by":"publisher","unstructured":"Beutner, R., Finkbeiner, B., Frenkel, H., Metzger, N.: Second-order hyperproperties. In: Computer Aided Verification (CAV 2023). LNCS, vol. 13965, pp. 309\u2013332. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-37703-7_15","DOI":"10.1007\/978-3-031-37703-7_15"},{"key":"23_CR7","unstructured":"Beutner, R., Finkbeiner, B., Frenkel, H., Metzger, N.: Monitoring second-order hyperproperties. In: 23rd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2024), pp. 180\u2013188 (2024). https:\/\/dl.acm.org\/doi\/10.5555\/3635637.3662865"},{"key":"23_CR8","unstructured":"Bj\u00f8rner, N., Veanes, M.: Symbolic transducers. Tech. Rep. MSR-TR-2011-3, Microsoft Research, Redmond (2011), https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/MSR-TR-2011-3.pdf"},{"key":"23_CR9","doi-asserted-by":"publisher","unstructured":"Bozzelli, L., Peron, A., S\u00e1nchez, C.: Asynchronous extensions of HyperLTL. In: 36th Annual ACM\/IEEE Symposium on Logic in Computer Science ( LICS 2021), pp. 1\u201313. IEEE (2021). https:\/\/doi.org\/10.1109\/LICS52264.2021.9470583","DOI":"10.1109\/LICS52264.2021.9470583"},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Bozzelli, L., Peron, A., S\u00e1nchez, C.: Expressiveness and decidability of temporal logics for asynchronous hyperproperties. In: 33rd International Conference on Concurrency Theory, (CONCUR 2022). LIPIcs, vol.\u00a0243, pp. 27:1\u201327:16. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2022). https:\/\/doi.org\/10.4230\/LIPICS.CONCUR.2022.27","DOI":"10.4230\/LIPICS.CONCUR.2022.27"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-662-54580-5_5","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"N Brett","year":"2017","unstructured":"Brett, N., Siddique, U., Bonakdarpour, B.: Rewriting-based runtime verification for alternation-free HyperLTL. In: Legay, A., Margaria, T. (eds.) TACAS 2017. LNCS, vol. 10206, pp. 77\u201393. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54580-5_5"},{"key":"23_CR12","doi-asserted-by":"publisher","unstructured":"Chalupa, M., Henzinger, T.A.: Monitoring hyperproperties with prefix transducers. In: Runtime Verification - 23rd International Conference (RV 2023). LNCS, vol. 14245, pp. 168\u2013190. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-44267-4_9","DOI":"10.1007\/978-3-031-44267-4_9"},{"key":"23_CR13","doi-asserted-by":"publisher","unstructured":"Chalupa, M., Henzinger, T.A., da\u00a0Costa, A.O.: Monitoring extended hypernode logic. In: Integrated Formal Methods - 19th International Conference (iFM 2024). LNCS, vol. 15234, pp. 151\u2013171. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-76554-4_9","DOI":"10.1007\/978-3-031-76554-4_9"},{"key":"23_CR14","doi-asserted-by":"publisher","unstructured":"Chalupa, M., Henzinger, T.A., da Costa, A.O.: Monitoring hypernode logic over infinite domains (artifact) (2025). https:\/\/doi.org\/10.5281\/zenodo.16357544","DOI":"10.5281\/zenodo.16357544"},{"key":"23_CR15","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model checking, 1st Edition. MIT Press (2001). http:\/\/books.google.de\/books?id=Nmc4wEaLXFEC, ISBN: 978-0-262-03270-4"},{"issue":"6","key":"23_CR16","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.3233\/JCS-2009-0393","volume":"18","author":"MR Clarkson","year":"2010","unstructured":"Clarkson, M.R., Schneider, F.B.: Hyperproperties. J. Comput. Secur. 18(6), 1157\u20131210 (2010). https:\/\/doi.org\/10.3233\/JCS-2009-0393","journal-title":"J. Comput. Secur."},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-319-63387-9_3","volume-title":"Computer Aided Verification","author":"L D\u2019Antoni","year":"2017","unstructured":"D\u2019Antoni, L., Veanes, M.: The power of symbolic automata and transducers. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017. LNCS, vol. 10426, pp. 47\u201367. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63387-9_3"},{"issue":"2","key":"23_CR18","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/S10009-015-0380-3","volume":"18","author":"N Decker","year":"2016","unstructured":"Decker, N., Leucker, M., Thoma, D.: Monitoring modulo theories. Int. J. Softw. Tools Technol. Transf. (STTT) 18(2), 205\u2013225 (2016). https:\/\/doi.org\/10.1007\/S10009-015-0380-3","journal-title":"Int. J. Softw. Tools Technol. Transf. (STTT)"},{"issue":"4","key":"23_CR19","doi-asserted-by":"publisher","first-page":"435","DOI":"10.3233\/JCS-2009-0340","volume":"17","author":"S Delaune","year":"2009","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols. J. Comput. Secur. 17(4), 435\u2013487 (2009). https:\/\/doi.org\/10.3233\/JCS-2009-0340","journal-title":"J. Comput. Secur."},{"key":"23_CR20","doi-asserted-by":"publisher","unstructured":"Faella, M., Parlato, G.: A unified automata-theoretic approach to LTL$$ _{\\text{f}}$$ modulo theories. In: 27th European Conference on Artificial Intelligence (ECAI 2024), Frontiers in Artificial Intelligence and Applications, vol.\u00a0392, pp. 1254\u20131261. IOS Press (2024). https:\/\/doi.org\/10.3233\/FAIA240622","DOI":"10.3233\/FAIA240622"},{"key":"23_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-319-67531-2_12","volume-title":"Runtime Verification","author":"B Finkbeiner","year":"2017","unstructured":"Finkbeiner, B., Hahn, C., Stenger, M., Tentrup, L.: Monitoring hyperproperties. In: Lahiri, S., Reger, G. (eds.) RV 2017. LNCS, vol. 10548, pp. 190\u2013207. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67531-2_12"},{"key":"23_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-319-89963-3_11","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"B Finkbeiner","year":"2018","unstructured":"Finkbeiner, B., Hahn, C., Stenger, M., Tentrup, L.: $$\\text{ RVHyper }$$: a runtime verification tool for temporal hyperproperties. In: Beyer, D., Huisman, M. (eds.) TACAS 2018. LNCS, vol. 10806, pp. 194\u2013200. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89963-3_11"},{"issue":"3","key":"23_CR23","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/s10703-019-00334-z","volume":"54","author":"B Finkbeiner","year":"2019","unstructured":"Finkbeiner, B., Hahn, C., Stenger, M., Tentrup, L.: Monitoring hyperproperties. Formal Methods Syst. Design 54(3), 336\u2013363 (2019). https:\/\/doi.org\/10.1007\/s10703-019-00334-z","journal-title":"Formal Methods Syst. Design"},{"key":"23_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-642-36742-7_19","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"R Grigore","year":"2013","unstructured":"Grigore, R., Distefano, D., Petersen, R.L., Tzevelekos, N.: Runtime verification based on register automata. In: Piterman, N., Smolka, S.A. (eds.) TACAS 2013. LNCS, vol. 7795, pp. 260\u2013276. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36742-7_19"},{"key":"23_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-89722-6_10","volume-title":"Principles of Security and Trust","author":"I Grishchenko","year":"2018","unstructured":"Grishchenko, I., Maffei, M., Schneidewind, C.: A semantic framework for the security analysis of ethereum smart contracts. In: Bauer, L., K\u00fcsters, R. (eds.) POST 2018. LNCS, vol. 10804, pp. 243\u2013269. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89722-6_10"},{"key":"23_CR26","doi-asserted-by":"publisher","unstructured":"Gutsfeld, J.O., M\u00fcller-Olm, M., Ohrem, C.: Automata and fixpoints for asynchronous hyperproperties. Proc. ACM Program. Lang. 5(POPL), 1\u201329 (2021). https:\/\/doi.org\/10.1145\/3434319","DOI":"10.1145\/3434319"},{"key":"23_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-030-32079-9_5","volume-title":"Runtime Verification","author":"C Hahn","year":"2019","unstructured":"Hahn, C.: Algorithms for monitoring hyperproperties. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 70\u201390. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32079-9_5"},{"key":"23_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-030-17465-1_7","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"C Hahn","year":"2019","unstructured":"Hahn, C., Stenger, M., Tentrup, L.: Constraint-based monitoring of hyperproperties. In: Vojnar, T., Zhang, L. (eds.) TACAS 2019. LNCS, vol. 11428, pp. 115\u2013131. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17465-1_7"},{"key":"23_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-75632-5_3","volume-title":"Lectures on Runtime Verification","author":"K Havelund","year":"2018","unstructured":"Havelund, K., Reger, G., Thoma, D., Z\u0103linescu, E.: Monitoring events that carry data. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 61\u2013102. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_3"},{"key":"23_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-030-72016-2_6","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"T-H Hsu","year":"2021","unstructured":"Hsu, T.-H., S\u00e1nchez, C., Bonakdarpour, B.: Bounded model checking for hyperproperties. In: TACAS 2021. LNCS, vol. 12651, pp. 94\u2013112. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72016-2_6"},{"key":"23_CR31","doi-asserted-by":"publisher","unstructured":"Pinisetty, S., Schneider, G., Sands, D.: Runtime verification of hyperproperties for deterministic programs. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering (FormaliSE 2018), pp. 20\u201329. ACM (2018).https:\/\/doi.org\/10.1145\/3193992.3193995","DOI":"10.1145\/3193992.3193995"},{"key":"23_CR32","doi-asserted-by":"publisher","unstructured":"Rakotonirina, I., Barthe, G., Schneidewind, C.: Decision and complexity of dolev-yao hyperproperties. Proc. ACM Program. Lang. 8(POPL), 1913\u20131944 (2024). https:\/\/doi.org\/10.1145\/3632906","DOI":"10.1145\/3632906"},{"key":"23_CR33","doi-asserted-by":"publisher","unstructured":"S\u00e1nchez, C.: Synchronous and asynchronous stream runtime verification. In: 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecution (VORTEX 2021), pp.\u00a05\u20137. ACM (2021). https:\/\/doi.org\/10.1145\/3464974.3468453","DOI":"10.1145\/3464974.3468453"},{"key":"23_CR34","doi-asserted-by":"publisher","unstructured":"Veanes, M., Hooimeijer, P., Livshits, B., Molnar, D., Bj\u00f8rner, N.S.: Symbolic finite state transducers: algorithms and applications. In: Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2012), pp. 137\u2013150. ACM (2012). https:\/\/doi.org\/10.1145\/2103656.2103674","DOI":"10.1145\/2103656.2103674"},{"key":"23_CR35","doi-asserted-by":"publisher","unstructured":"Zdancewic, S., Myers, A.: Observational determinism for concurrent program security. In: 16th IEEE Computer Security Foundations Workshop (CSF 2003), pp. 29\u201343 (2003). https:\/\/doi.org\/10.1109\/CSFW.2003.1212703","DOI":"10.1109\/CSFW.2003.1212703"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05435-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T07:43:12Z","timestamp":1766043792000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05435-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,12]]},"ISBN":["9783032054340","9783032054357"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05435-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,9,12]]},"assertion":[{"value":"12 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Runtime Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rv25.isec.tugraz.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}