Professional Documents
Culture Documents
Download textbook Leveraging Applications Of Formal Methods Verification And Validation Verification 8Th International Symposium Isola 2018 Limassol Cyprus November 5 9 2018 Proceedings Part Ii Tiziana Margaria ebook all chapter pdf
Download textbook Leveraging Applications Of Formal Methods Verification And Validation Verification 8Th International Symposium Isola 2018 Limassol Cyprus November 5 9 2018 Proceedings Part Ii Tiziana Margaria ebook all chapter pdf
https://textbookfull.com/product/runtime-verification-18th-
international-conference-rv-2018-limassol-cyprus-
november-10-13-2018-proceedings-christian-colombo/
https://textbookfull.com/product/foundations-of-intelligent-
systems-24th-international-symposium-ismis-2018-limassol-cyprus-
october-29-31-2018-proceedings-michelangelo-ceci/
https://textbookfull.com/product/discovery-science-21st-
international-conference-ds-2018-limassol-cyprus-
october-29-31-2018-proceedings-larisa-soldatova/
Tiziana Margaria · Bernhard Steffen (Eds.)
Leveraging Applications
of Formal Methods,
LNCS 11245
123
Lecture Notes in Computer Science 11245
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zurich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology Madras, Chennai, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbrücken, Germany
More information about this series at http://www.springer.com/series/7407
Tiziana Margaria Bernhard Steffen (Eds.)
•
Leveraging Applications
of Formal Methods,
Verification and Validation
Verification
8th International Symposium, ISoLA 2018
Limassol, Cyprus, November 5–9, 2018
Proceedings, Part II
123
Editors
Tiziana Margaria Bernhard Steffen
University of Limerick TU Dortmund
Limerick, Ireland Dortmund, Germany
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
Symposium Chair
Bernhard Steffen TU Dortmund, Germany
Program Chair
Bernhard Steffen TU Dortmund, Germany
Program Committee
Wolfgang Ahrendt Chalmers University of Technology, Sweden
Jesper Andersen Deon Digital AG
Ezio Bartocci TU Wien, Austria
Dirk Beyer LMU Munich, Germany
Manfred Broy Technische Universität München
Loek Cleophas TU Eindhoven, The Netherlands
Rocco De Nicola IMT School for Advanced Studies, Italy
Boris Düdder University of Copenhagen, Denmark
Ylies Falcone University of Grenoble, France
Michael Felderer University of Innsbruck, Austria
John Fitzgerald Newcastle University, UK
Paul Gibson Telecom Sud Paris, France
Kim Guldstrand Aalborg University, Denmark
Larsen
Dilian Gurov KTH Royal Institute of Technology, Sweden
John Hatcliff Kansas State University, USA
Klaus Havelund Jet Propulsion Laboratory, USA
Fritz Henglein University of Copenhagen, Denmark
Axel Hessenkämper Hottinger Baldwin Messtechnik GmbH
Falk Howar Dortmund University of Technology and Fraunhofer ISST,
Germany
Marieke Huisman University of Twente, The Netherlands
Michael Huth Imperial College London, UK
Stefan Jaehnichen TU Berlin, Germany
Rahul Kumar Microsoft Research
Anna-Lena Utrecht University, The Netherlands
Lamprecht
Peter Gorm Larsen Aarhus University, Denmark
Axel Legay Inria, France
Martin Leucker University of Lübeck, Germany
VIII Organization
Additional Reviewers
RERS 2018
Doctoral Symposium
increase confidence over what runtime verification can achieve alone. And run-
time analysis can learn information that can be used later for static analysis
(e.g., mining invariants, and detecting data structures) [21]. Finally, it has been
observed that the two approaches (static and runtime) tend to focus on different
kinds of specifications with static techniques often focussing on simpler state-
based properties and runtime techniques focussing on richer temporal properties.
This leads to a simple benefit from combination – a wider range of properties
can be checked. Significant progress has been made in these directions, but it is
also evident that the communities, targets, methods, and discussions in static
and runtime verification research are still too unrelated. There is even less of a
connection between early design-time verification techniques (e.g., model check-
ing), the intermediate (e.g., code analysis), and execution-time (e.g., runtime
monitoring) verification techniques in the system development cycle.
Within this track, we investigate what can be achieved in joint efforts of
the communities of verification techniques for different design stages, including
static and dynamic analyses, model checking, deductive verification, and runtime
verification. This track is a follow-up of the track Static and Runtime Verifica-
tion: Competitors or Friends?, organised during ISoLA 2016 [18]. That track
investigated the different ways in which static and runtime verification could
be combined, addressed questions such as which application areas could bene-
fit from combinations of static and dynamic analysis, which program properties
can be established using which technique, what artefacts can be carried forward
through different verification technologies, what is a good balance of guarantees
and user efforts in various application areas, and how we can integrate the vari-
ous techniques into the software, and hybrid/cyber-physical system development
process. We believe that the track in 2016 was a very good catalyst for the con-
nection of the different communities, and the formation of common agendas. At
the same time, it is clear that a one-time event would not be enough to fully
achieve and sustain the set goals.
The current track A Broader View on Verification: From Static to Runtime
and Back, at ISoLA 2018, continues and further develops the cross-community
endeavour for an integrated interplay of static and runtime techniques, with the
overall aim of building systems that are evidently well-functioning. The track
features eight contributions, by 24 authors in total, on three different topics:
application areas; classes of properties; and practical issues of combining static
and runtime techniques. We would like to thank all the authors for their con-
tributions to this track, in the form of the papers written, and in the form of
on-site discussions. We would also like to thank everyone who visited this track
at ISoLA, showed interest in the overall topic and the individual talks, and
participated in the discussions.
Finally, we would like to express our deep gratitude to the ISoLA organisers,
in particular Tiziana Margaria and Bernhard Steffen, for working so hard to
provide such a wonderful platform for our and other tracks, enabling lively and
creative interaction between individuals and communities, helping us all to not
A Broader View on Verification 5
forget the bigger picture of working for the development of systems that people
can rely on.
2 Contributions
2.1 Topic 1: Application Areas for Combining Static and Runtime
Verification
This topic is dedicated to different application areas of system development
exploiting static and dynamic techniques.
In Programming Safe Robotics Systems: Challenges, Advances, and Oppor-
tunities [14], Ankush Desai, Sanjit Seshia, and Shaz Qadeer present a program-
ming framework for building a safe robotics system. It consists of a high-level
programming language for implementing, specifying, and systematically testing
the reactive robotics software, as well as a runtime enforcement system ensuring
that assumptions made in the testing phase actually hold at runtime.
In Generating Component Interfaces by Integrating Static and Symbolic Anal-
ysis, Learning, and Runtime Monitoring [19], Falk Howar, Dimitra Giannako-
poulou, Malte Mues, and Jorge Navas present extensions to a tool for interface
generation that integrates interpolation and symbolic search. Also, they dis-
cuss how to use information from runtime monitoring to validate the generated
interfaces.
References
1. Aceto, L., Francalanza, A., Ingolfsdottir, A.: Proceedings First Workshop on Pre-
and Post-Deployment Verification Techniques. ArXiv e-prints, May 2016
2. Ahrendt, W., Beckert, B., Bubel, R., Hähnle, R., Schmitt, P.H., Ulbrich, M.:
Deductive Software Verification-The KeY Book: From Theory to Practice. LNCS,
vol. 10001. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49812-6
3. Ahrendt, W., Chimento, J.M., Pace, G.J., Schneider, G.: Verifying data- and
control-oriented properties combining static and runtime verification: theory and
tools. Form. Methods Syst. Des. 51(1), 200–265 (2017). https://doi.org/10.1007/
s10703-017-0274-y
4. Ahrendt, W., Pace, G.J., Schneider, G.: StaRVOOrS — episode II - strengthen
and distribute the force. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS,
vol. 9952, pp. 402–415. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-
47166-2 28
5. Bartocci, E., Falcone, Y., Francalanza, A., Reger, G.: Introduction to runtime
verification. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification.
LNCS, vol. 10457, pp. 1–33. Springer, Cham (2018). https://doi.org/10.1007/978-
3-319-75632-5 1
A Broader View on Verification 7
6. Beckert, B., Herda, M., Kobischke, S., Ulbrich, M.: Towards a notion of coverage for
incomplete program-correctness proofs. In: Margaria, T., Steffen, B. (eds.) ISoLA
2018. LNCS, vol. 11245, pp. 53–63. Springer, Cham (2018)
7. Bodden, E., Lam, P., Hendren, L.J.: Partially evaluating finite-state runtime mon-
itors ahead of time. ACM Trans. Program. Lang. Syst. 34(2), 7:1–7:52 (2012).
https://doi.org/10.1145/2220365.2220366
8. Bonakdarpour, B., Sánchez, C., Schneider, G.: Monitoring hyperproperties by com-
bining static analysis and runtime verification. In: Margaria, T., Steffen, B. (eds.)
ISoLA 2018. LNCS, vol. 11245, pp. 8–27. Springer, Cham (2018)
9. Boockmann, J.H., Lüttgen, G., Mühlberg, J.T.: Generating inductive shape pred-
icates for runtime checking and formal verification. In: Margaria, T., Steffen, B.
(eds.) ISoLA 2018. LNCS, vol. 11245, pp. 64–74. Springer, Cham (2018)
10. Chen, X., Rosu, G.: A language-independent program verification framework.
In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11245, pp. 92–102.
Springer, Cham (2018)
11. Cheon, Y., Leavens, G.T.: A Runtime Assertion Checker for the Java Modeling
Language (JML) (2002)
12. Clarke, E.M., Henzinger, T.A., Veith, H., Bloem, R.P.: Handbook of Model Check-
ing. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-10575-8
13. Clarke, L.A., Rosenblum, D.S.: A historical perspective on runtime assertion check-
ing in software development. ACM SIGSOFT Softw. Eng. Notes 31(3), 25–37
(2006)
14. Desai, A., Seshia, S., Qadeer, S.: Programming safe robotics systems: challenges,
advances, and opportunities. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS,
vol. 11245, pp. 103–119. Springer, Cham (2018)
15. Filliâtre, J.C.: Deductive software verification. Int. J. Softw. Tools Technol. Transf.
13(5), 397 (2011). https://doi.org/10.1007/s10009-011-0211-0
16. Fisman, D., Kugler, H.: Temporal reasoning on incomplete paths. In: Margaria,
T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11245, pp. 28–52. Springer, Cham
(2018)
17. Francalanza, A., Pace, G.J.: Proceedings Second International Workshop on Pre-
and Post-Deployment Verification Techniques. ArXiv e-prints, August 2017
18. Gurov, D., Havelund, K., Huisman, M., Monahan, R.: Static and runtime verifica-
tion, competitors or friends? (Track Summary). In: Margaria, T., Steffen, B. (eds.)
ISoLA 2016. LNCS, vol. 9952, pp. 397–401. Springer, Cham (2016). https://doi.
org/10.1007/978-3-319-47166-2 27
19. Howar, F., Giannakopoulou, D., Mues, M., Navas, J.: Generating component inter-
faces by integrating static and symbolic analysis, learning, and runtime monitoring.
In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11245, pp. 120–136.
Springer, Cham (2018)
20. Maurica, F., Cok, D., Signoles, J.: Runtime assertion checking and static verifica-
tion: collaborative partners. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS,
vol. 11245, pp. 75–91. Springer, Cham (2018)
21. Rupprecht, T., Chen, X., White, D.H., Boockmann, J.H., Lüttgen, G., Bos, H.:
DSIbin: identifying dynamic data structures in C/C++ binaries. In: Rosu, G.,
Penta, M.D., Nguyen, T.N. (eds.) Proceedings of the 32nd IEEE/ACM Interna-
tional Conference on Automated Software Engineering, ASE 2017, Urbana, IL,
USA, 30 October–3 November 2017, pp. 331–341. IEEE Computer Society (2017)
Monitoring Hyperproperties
by Combining Static Analysis
and Runtime Verification
1 Introduction
may analyze the executions of the program online (while the program is run-
ning) or offline (the execution traces of the program are collected and analyzed
a-posteriori)1 . In runtime verification, the monitor is generated automatically
from the property, written in a formal language, usually as a logical formula or
as an automaton. As in testing, runtime verification may be black box or white
box, depending on whether the monitor can only observe the behavior of the sys-
tem (the input-output events or states), or whether the monitor has additionally
access to the internals of the monitored program.
In the context of trace logics (where properties can be evaluated indepen-
dently on each individual trace) it is known that not all properties are moni-
torable, because the monitors can only observe finite prefixes of executions. Mon-
itorability means that there exists a monitor that can declare correctly whether
the property is permanently satisfied or violated in all future extensions of the
observed prefix traces. Previous results in trace logics show how to build moni-
tors for some combinations of safety and co-safety properties. Formalisms pro-
posed for generating monitors include, among others, LTL adapted for finite
paths [9,23,29], regular expressions [43], rule based languages [7], rewriting [40],
streams [21] and automata [20].
In this paper, we study a richer class of properties called hyperproperties [19],
that is, properties of sets of traces instead of over individual traces. Many secu-
rity properties, like information-flow properties such as non-interference, are
hyperproperties. In particular, many of the common and interesting security
properties are 2-safety hyperproperties [19], meaning that it can be expressed
using universal quantification over pairs of finite traces. Monitoring hyperprop-
erties requires to collect and reason about multiple finite runs, and not only to
collect and reason about a single run. As with trace logics, there is a source
of uncertainty because the traces under observation are finite and correspond
to a prefix of execution. However, in monitoring hyperproperties there is an
additional source of imperfect observability because if the collection of traces is
approximated dynamically by the traces executed, it is possible that the set also
contains traces that have not been observed.
It has been shown that it is possible to construct monitors for ∀∀ hyper-
properties if the temporal formula is restricted to safety [1,12,26], where some
limitations of monitorability are also explored. In particular, one cannot—in
general—determine at runtime whether a ∀∀ property is satisfied because this
may require to obtain all possible executions of the system. However, one can
monitor ∀∀ safety properties for violations.
In this paper, we show that ∀∃ (and ∃ ∀) are not monitorable in general.
Then, we explore new ideas on how to monitor properties of the form ∀∃ by
using a grey box approach, that is by exploiting certain information we have
about the system to perform the monitoring task. This additional information
1
The definition of offline monitoring also includes when traces are obtained from
other sources than the program running in its real environment (e.g., in a simulation
environment, or traces not coming from the real program but from a model, for
instance).
10 B. Bonakdarpour et al.
Intuitively, this formula requires that for any instantiation of trace variables
π and π , say to concrete traces u and u , the value of proposition a in the
i-th position of u should agree with the value of a in the i-th position of u .
For example, let u = (¬a)(¬a)(a)(¬a)(a) and u = (¬a)(a)(a)(¬a)(a). This
pair of finite traces permanently violates ϕ because u and u do not agree on
12 B. Bonakdarpour et al.
– We first show that U can be extended to a set of traces Ubad that violates ψ.
Assume that all traces in U have the same length (otherwise simply add arbi-
trary padding states to the shorter traces). Then, create U by adding the same
state a extending every observed trace in U . Since P (a, a) is false, every pair of
traces in U falsifies P (xπ , xπ ). The set Ubad is obtained by extending U to
infinite traces arbitrarily. This shows that ψ cannot be monitored for satisfac-
tion because every observation U can be extended to a counterexample.
– We show now that U can be extended to a model Ugood that satisfies ψ, by
taking the set of all executions. It is easy to see the set of all executions satis-
fies ψ as every trace σ has a corresponding trace σ that satisfies P (xπ , xπ ).
One can simply make, for all positions i in the trace, σ (i) the assignment to
the state variables that make P (σ(i), σ (i) true. This shows that ψ cannot be
monitored for violations because every observation U can be extended to a
model.
3 Examples of Hyperproperties
We show here examples of hyperproperties, some of which are ∀∀, others are ∀∃,
and one ∀∀∃. Some of these hyperproperties follow the “standard” viewpoint
in which traces are alternative executions of a single system under observation
14 B. Bonakdarpour et al.
(Sect. 3.1). Others, however, are obtained by taking a different point of view
(Sect. 3.2): different quantifiers can be instantiated with traces from different
systems, or from different components of a running system (e.g., the traces of
execution of two threads).
The first observation in (1) is that for trace variables π and π to be obser-
vationally equivalent (as denoted by Obs(π, π )) the instructions that threads
execute outside an invocation to the datatype or internally within the body of
the datatype are not visible. Only the execution of calls and returns are visible,
and Obs(π, π ) claim that these events are identical in both traces.
(¬cs 1 ∨ ¬cs2 ),
where cs i for i ∈ {1, 2} indicates that process i is in the critical section. This
formula expresses mutual exclusion over the global states of the system. However,
in many concurrent and distributed systems, traces are collected from individual
processes or computing cores because in some circumstances it is not easy or
even possible to construct interleaved traces. This way, it is more convenient
to express a requirement such as mutual exclusion as a hyperproperty where
traces correspond to local executions. Thus, mutual exclusion can be expressed
in HyperLTL by formula
where π and π are traces collected from two different processes, cores, or threads.
A similar example is data races. A data race happens when there are two
memory accesses (at least one being a write) performed concurrently by two
threads, to the same location and that are not protected by synchronization
operations. For a given memory location, this property can be expressed as a ∀∀
property where traces are the local executions of the threads.
Some examples of ∀∃ properties in the setting of concurrent and distributed
systems include the following:
2
The General Data Protection Regulation (EU—2016/679) was adopted on 27 April
2016, and it will enter into application 25 May 2018.
3
A stronger version of distributed minimality, which is a ∀∀ hyperproperty, is given
in [36].
Monitoring Hyperproperties by Combining Static Analysis 17
The predicate output establishes that the functions represented by the two traces
terminate, and that the computed output is the same. Similarly, we define
differj (π, π ) : inj (π) = inj (π ) almostj (π, π ) : ink (π) = ink (π )
k=j
The predicate differj establishes that the inputs to the function are different
in the parameter j, and almostj that the input to the function agree on all
parameters except possibly on j. Now we can define distributed minimality for
input j as:
⎛ ⎞ ⎛ ⎞
samej (π, π ) almostj (π , π )
φjdm = ∀π.∀π .∃π .∃π .differj (π, π ) → ⎝
∧ ⎠∧⎝ ∧ ⎠
samej (π , π ) ¬output(π , π )
where samej (π, π ) = ¬dif f erj (π, π ). So, distributed minimality is defined as:
j
ϕdm : ϕdm .
j=1..n
4
Note that the pair ((0, 1), (1, 1)) would not satisfy the definition, but this is fine as
the definition only requires that at least one such tuple exists.
Another random document with
no related content on Scribd:
in good condition for their government owner—His “discovery”
that the states, political entities, made the Constitution of
America, the nation of men—Story of America (from May 29,
1787, to July, 1917) being a sealed book to him, he does not
know that our Constitution is both federal and national—
Supreme Court, in early days and in 1907, and Webster and
Lincoln tell him his mistake—Not knowing the decision of
Gettysburg, recorded at Appomattox, he chooses between Lord
North of 1775 and Calhoun and summons the latter to prove that
the American people did not make their Constitution and its
grant of enumerated power to interfere with their individual
freedom—Jefferson, Pendleton, Webster and many other
Americans correct Sheppard’s error of fact—As the American
people of 1776 accomplished their successful Revolution
against government, may it not be the thought of Sheppard and
other Tories that the Eighteenth Amendment has been
established by a successful revolution of government against
the people—Marshall again tells us of the American day when
the legal necessity “was felt and acknowledged by all,” that
every power to interfere with human liberty must be derived from
the people in their “conventions”—Acting on the Congress
proposal of 1917, governments of state citizens command the
American citizen and create a new government power to
interfere with his individual liberty—But no statesman has yet
told us how or when, prior to 1917, we became “subjects.”
XIX. Are We Citizens? Page 298
Hamilton thinks it a prodigy that Americans, in “conventions,”
voluntarily constitute the enumerated First Article government
powers to interfere with their individual liberty—Marshall, in
Supreme Court, declares “conventions” to be the only manner in
which they can act “safely, wisely and effectively” in constituting
government of themselves, by making such grants—When
proposed 1917 first new grant of that kind is supposedly made,
American people and their “conventions” are completely ignored
—The proposers have a Fifth Article which does not mention
“conventions”—The proposers have the old Tory concept, that
the people are the assets of the state and that government is the
state—Still trying to find out how and when we became
“subjects,” we expect to get information from the litigations of
1920—We expect great counsel, on one side, to urge the facts
we know—We fear that other great counsel will urge, in reply,
some fact or facts which we have not been able to ascertain—
We are certain that there is no Eighteenth Amendment, if the
facts we have learned are all the facts—That we may listen
intelligently to all the great counsel, we review some of the facts
we have learned.
XX. Lest We Forget Page 307
“The important distinction so well understood in America,
between a constitution established by the people and
unalterable by the government and a law established by the
government and alterable by the government”—Our first glance
at briefs of 1920 gives us hope that some modern leaders have
acquired the knowledge of Hamilton and his generation—We
find, in one brief, in Marshall’s words, the Supreme Court
statement of the fact that “conventions” of the people, not states
or their governments, made the Constitution with its First Article
grants of power to interfere with human liberty—But this brief, to
our amazement, is that of the foremost champion of the only
other grant of that kind, the Eighteenth Amendment, a grant
made entirely by government to government—In 1920, seven
litigations argued and reported under the one title “The National
Prohibition Cases”—Distinguished counsel appear for many
clients, for the claimed omnipotent Parliament of America, for
the American government which we used to know as our
supreme government, for a few state governments who did not
wish to be part of the omnipotent Parliament, for those engaged
in the lawful business of manufacturing, etc., the commodities
named in the Eighteenth Amendment—Like the human right to
breathe, such manufacture, etc., was not the privilege of a
citizen—Both rights are among the human rights men have
before they create nations and give governments power to
interfere with some or all of their human rights—Citizens of
America, giving their only American government its enumerated
powers, gave it no power to interfere with the human right
mentioned in the new Amendment—Human rights never are
privileges of citizens—Citizens establish government to protect
existing human rights—Only “subjects” get any rights or
privileges from government—All early Americans knew these
primal truths—Neither the French aristocrats, before French
Revolution, nor Tories of 1776 in England or America knew them
—Eighteenth Amendment Tories do not know them—Madison
(in 1789) and Supreme Court (in 1890) knew that commodities
named in new Amendment are among those in which a human
right “of traffic exists”—In litigations of 1920, no counsel appear
on behalf of the human rights of American citizens—But we
know that no decision of our own Supreme Court, established to
secure our human rights, although the decision may settle
disputes between other litigants, can change us from “citizens”
into “subjects.”
XXI. Briefs Ignore the American Page 325
Citizen
No counsel knows all are discussing whether Americans, twelve
years after 1776, voluntarily became “subjects”—Common
concept of all that Fifth Article a “grant” of power to state
governments (of state citizens) making them attorneys-in-fact for
citizens of America—Discussion entirely as to extent of power
“granted”—Eighteenth Amendment concept that Fifth Article
“grant” made some governments of state citizens a supreme
American Parliament, unrestrained master of every human right
of all American citizens—Opposing concept that the Fifth Article
“grant” made those state governments a Parliament whose one
limit is that it cannot interfere with the sovereignty of any political
entity which is a state—Both concepts ignore supremacy of
nation of men over federation of states—Both ignore dual nature
of “one national and federal Constitution”—Both ignore
“conventions” in Seventh and Fifth Articles as the citizens of the
American nation—Both ignore that each state “legislature” is
attorney-in-fact for the citizens of its own state and that no
legislatures are (except Congress in enumerated matters)
attorneys-in-fact for the citizens of America in any matter—Our
facts, brought from our education with the early Americans, all
ignored by all counsel in the litigations—The Virginia Convention
itself and Lee, Pinckney, Hamilton, Madison, Wilson, Iredell and
others state what all counsel of 1920 entirely ignore.
XXII. No Challenge to the Tory Page 335
Concept
Eighteenth Amendment rests on imaginary Fifth Article “grant”
making the state governments of state citizens attorneys-in-fact
for the citizens of America, empowered to give away all human
rights of the citizens of America—“Grant” assumed in every brief
—No brief recognizes that one supposed “grantee” is supposed
“grantor”—Or that each of two supposed “grantees” was a
competent maker of Articles (as proposed Articles were
respectively federal or national) before and when the
“conventions” made the Fifth Article—Or that Philadelphia
Convention knew and held “conventions” existing ability
competent to make any Article and state legislatures, existing
ability incompetent ever to make Articles like First Article or
Eighteenth Amendment—Or that Tenth Amendment declares no
power given to state “legislatures,” while all ability to make
national Articles “reserved” to “conventions” of “the people” of
America—No brief challenges sheer assumption of Fifth Article
“grant” or supports assumption by any fact—Every brief, for or
against Amendment, is based on the sheer assumption—No
brief knows that enumerated powers of only American
government to interfere with human freedom can be changed by
no one save the citizens of America themselves in their
“conventions”—Madison’s tribute to these “conventions” in which
“free inhabitants” constitute new government power over
themselves—Hamilton explains great danger to human liberty if
“legislatures” or permanent government bodies could create
such new government power—That knowledge of his generation
confirmed by story of government-made supposed Eighteenth
Amendment—Our gratitude to that generation of men who
(1776) made it and (1788) left it impossible that governments
could create new government power to interfere with American
human liberty—Our regret that modern leaders have not known
this great and immutable protection to American liberty.
XXIII. The Challenges That Failed Page 350
Supreme Court wisely writes no opinion in “National Prohibition
Cases”—In each of four numbered paragraphs, Court states its
own negation of one challenge made to new Amendment—All
four challenges are negatived in seventeen lines of statement—
First two challenges trifling and purely technical—Third
challenge based on rights of the citizens of some particular state
—Fourth challenge to “extent” of Fifth Article “grant” of power by
“conventions” to “conventions” and “legislatures”—This
challenge asserts “grant” which advocates of Eighteenth
Amendment must and cannot prove—Court negative amazingly
accurate—All counsel have argued incessantly about “extent” of
power “granted” by Fifth Article—Court negatives in statement
which speaks of power “reserved” in Fifth Article—Concept of
“grant” disappears—Court knows what “conventions” knew,
when they made Fifth Article, when they insisted on Tenth
Amendment Declaration expressly stating the distinct reservees
of the two existing powers “reserved” in Fifth Article—Supreme
Court of Marshall’s day knows it and Supreme Court of 1907
knows it—“Citizen or Subject?”—Eighteenth Amendment
answers “Subject”—Real Constitution answers
“Citizen”—“Conventions” insisted on plain statement of correct
answer—Counsel of 1920 do not know it—Their four challenges
make plain that fact—All challenges based on error that
governments of state citizens are attorneys-in-fact for citizens of
America—In Virginia Convention and in Supreme Court,
Marshall explains that powers of state governments “proceed
not from the people of America” but from the citizens of each
respective state—No counsel of 1920 knows this important fact.
XXIV. Governments Claim Americans as Page 371
Subjects
Patrick Henry, opposing Constitution in the “conventions,” knows
that it takes power from the state legislatures and gives them no
power—All modern leaders “know” that it gives those
legislatures great power as attorneys-in-fact for the citizens of
America—Many modern leaders “know” that it makes those
legislatures an omnipotent Parliament over the citizens of
America—No modern leaders remember 1781 and 1787
existing ability of the state legislatures to make federal Articles
or Articles not creating government power to interfere with
human liberty—Common modern concept that Fifth Article is
“grant” to these “legislatures” and to the very “conventions”
which made the Fifth Article—Leading brief, against
Amendment, more than fifty times admits or asserts this
imaginary and remarkable “grant”—Some extraordinary
concepts of our American institutions in briefs—In a famous
opinion, Marshall explains a fact and on it bases the entire
decision of the Supreme Court—The fact itself is that the
Constitution granted no power of any kind to the state
legislatures—No brief knows or urges this fact or any of the facts
we learned in the “conventions,” the facts on which we base our
challenge to the Eighteenth Amendment concept that we are
“subjects”—Briefs for the Amendment examined to find out why
we are supposed to be “subjects”—Amazing claim that, when
governments alone change the national part of the Constitution,
Supreme Court has no power even to consider whether
governments in America can make a change in the enumerated
powers given to their own government by the citizens of America
—Remarkable Tory concept that the number of Senators from
each state is the only thing in America immune from government
invasion, if enough governments combine—Indignation of
American citizen changes to mirth when he realizes this concept
to be only basis of thought that he is a “subject” or that there is
an Eighteenth Amendment—American citizen, seeking to find (in
the briefs for the Amendment) what happened, between 1907
and 1917, to make him a “subject,” startled to hear the answer,
“Nothing”—Citizen’s amusement increased on learning, in same
briefs, that whole American people, in Constitution which
expressly declares it gives no power to state governments,
made those governments of state citizens irrevocable and
omnipotent attorneys-in-fact for the citizens of America—
Amusement increased by finding that main champion of Tory
concept quotes Marshall’s Supreme Court story of the making of
the Constitution, but omits, from the quotation, the paragraph in
which Marshall points out that everyone knew why the
“legislatures” could not make and only the “conventions” could
make the national First Article, with its grant of enumerated
power to interfere with human liberty—Curiosity added to mirth
on finding this brief echo Madison’s own knowledge that his Fifth
Article contains nothing but “procedural provisions,” while brief
bases its entire contention on mere assertion that Fifth Article is
greatest grant of power ever made by free men to government.
XXV. Citizen or “Eighteenth Page 397
Amendment”?
Congress is only legislature with any power of attorney from the
citizens of America—At very beginning and very end of original
Constitution, citizens of America expressly so state—All briefs of
1920 based on asserted assumption denying those two
statements and insisting Fifth Article is “grant” to governments of
state citizens—Briefs for new Amendment assert “grant” made
governments of state citizens omnipotent master of everything in
America (including all human rights) save number of Senators
from each state—On this Tory concept depends entirely
existence of Eighteenth Amendment—Tory concept being
absolute myth, Amendment disappears—Amusing to find Tory
briefs for Amendment with American citations and quotations
which annihilate Tory concept—Unconscious humor of Wheeler
surpasses “Comic Blackstone”—Tory legions, fighting under
crescent of Mohammet, claim to be American and Christian
crusaders—Americans would have remained “subjects” if
Parliament, passing the Stamp Act, had said: “You subjects
must obey this command we make but, making it, we do not
legislate”—“Statement” that citizens of America universally
demanded this sole Amendment which attempts to change the
First Article enumerated powers—“Proof” that 4742 Tory
members of governments of state citizens said “Yes” to the
change—Jefferson and Madison tell us that concentration of all
power in legislatures “is precisely the definition of despotic
government,” that 173 “despots would surely be as oppressive
as one,” and that “an elective despotism was not the
government we fought for”—Calhoun contended one state might
defy supreme will of citizens of America—Tories for Amendment
go far beyond doctrine finally repudiated by Gettysburg—On
Tory concept that we are “subjects” of omnipotent government,
assert that some governments of state citizens may dictate, in
all matters of human right, what the citizens of America may and
may not do—Echo from “conventions” which made Fifth Article,
“How comes it, sir, that these state governments dictate to their
superiors, to the majesty of the people?”
XXVI. The American Citizen Will Remain Page 416
Supreme Court holds American people, “for most important
purposes,” chose to be one nation, with only one government of
the First Article enumerated powers to interfere with human
liberty—America, the nation of men, and United States, the
subordinate federation of states—Tories for new Amendment
must prove that American people, as one “important” purpose,
meant that governments of state citizens could interfere with
every human right of American citizens—Reserved rights and
powers of American citizens are entirely at their own direct
disposal, for exercise or grant, “despite their legislatures,
whether representing the states or the federal government”—
American citizen must know this of his own knowledge or his
human freedom will disappear—Emmett and Webster and their
generation knew it—Madison writes Fifth Article and states
exactly what it is to the “conventions” which made it—Hughes
unable to begin his Tory argument for new Amendment without
adding to that Madison statement what Madison pointedly did
not say—Senate now about to repeat 1917 blunder that
governments of state citizens have aught to do with altering the
national part of the American Constitution, which part is within
the exclusive control of the citizens of America themselves
—“Conventions” are the people—“Legislatures” are
governments—“Citizen or Subject?”—Supreme Court answer
certain—Court’s history and traditions show American concept
of Hamilton that this Court bulwark of American citizen against
government usurpation of power to interfere with human liberty
—Webster forecast Court decision on new and Tory
Amendment, answering “Citizen or Subject?”—All Americans
once knew same correct answer to same question by Pendleton
in Virginia Convention of 1788, “Who but the people can
delegate power? What have the state governments to do with
it?”
APPENDICES
I. The Original Constitution of the Page 445
United States
II. The Resolution Which Proposed Page 458
the Constitution to the
Conventions of the People of
America
III. The First Seventeen Amendments Page 460
to the Constitution
IV. The Alleged Eighteenth Page 465
Amendment
V. The Nineteenth Amendment Page 466
CITIZEN OR SUBJECT?
CHAPTER I
SUBJECTS BECOME CITIZENS