摘要: Complex systems require runtime monitoring of their operation, and this task can be performed by a separate process. A hacked monitor however could use the system traces it receives to attack or leak information competitors. We introduce private verification, in which process learns nothing about traces, yet is still able correctly them for satisfaction temporal specifications.