2009
DOI: 10.1016/j.jlap.2008.08.004
|View full text |Cite
|
Sign up to set email alerts
|

A brief account of runtime verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
409
0
7

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 662 publications
(416 citation statements)
references
References 45 publications
0
409
0
7
Order By: Relevance
“…This paper focuses on runtime monitoring techniques which analyzes one particular program execution. For a general introduction into the field of runtime verification especially in comparison with static verification techniques such as model checking see [16,17]. Non-intrusive observation of program executions is a long-standing issue [23] that becomes increasingly challenging with high circuit integration.…”
Section: Contributionmentioning
confidence: 99%
“…This paper focuses on runtime monitoring techniques which analyzes one particular program execution. For a general introduction into the field of runtime verification especially in comparison with static verification techniques such as model checking see [16,17]. Non-intrusive observation of program executions is a long-standing issue [23] that becomes increasingly challenging with high circuit integration.…”
Section: Contributionmentioning
confidence: 99%
“…Another challenge is how to go from rule specifications written in the fraud CNL to executable code to process income information about entities and filter cases satisfying the rule. In order to perform this, we have used runtime monitoring [LS09] techniques to compile CNL statements compositionally into stream processors which flag matching cases.…”
Section: Fig 1 Fraud Detection Processmentioning
confidence: 99%
“…There has been much work in runtime monitoring [LS09] on building techniques to address such situations efficiently. It was thus decided that we adopt a standard runtime verification tool, Larva [CPS09], to process the data efficiently, using techniques from [CP13,CPA09].…”
Section: Monitoring Fraud Rulesmentioning
confidence: 99%
“…In the first case, we can detect violations (detective enforcement) whereas in the second case, we can also prevent violations from happening by blocking or modifying attempted events, and by performing compensating, penalizing, or notifying actions. Efficient runtime verification technology is available [8].…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, our work adds the dimension of usage control that allows to specify and enforce more fine-grained constraints on these sinks. Conversely, usage control models are usually defined on the grounds of technical events, including specific technologies such as complex event processing or runtime verification [23,8], but do not cater to the flow of data. We add the distinction between representation and data to these models.…”
Section: Introductionmentioning
confidence: 99%