2016
DOI: 10.1007/s10009-016-0413-6
|View full text |Cite
|
Sign up to set email alerts
|

Fully automated runtime enforcement of component-based systems with formal and sound recovery

Abstract: We introduce runtime enforcement of specifications on component-based systems (CBS) modeled in the BIP (Behavior, Interaction and Priority) framework. Runtime enforcement is an increasingly popular and effective dynamic validation technique aiming to ensure the correct runtime behavior (w.r.t. a formal specification) of a system using a socalled enforcement monitor. BIP is a powerful and expressive component-based framework for the formal construction of heterogeneous systems. Because of BIP expressiveness how… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1

Relationship

5
1

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 49 publications
0
12
0
Order By: Relevance
“…We also work on extending HDBIP to support fault tolerance. We also consider to leverage the asynchronous send/receive communication primitive to improve the efficiency of the runtime verification [10] and enforcement [9] of component-based systems.…”
Section: Discussionmentioning
confidence: 99%
“…We also work on extending HDBIP to support fault tolerance. We also consider to leverage the asynchronous send/receive communication primitive to improve the efficiency of the runtime verification [10] and enforcement [9] of component-based systems.…”
Section: Discussionmentioning
confidence: 99%
“…-(i) define specification formalisms tailored to our model of CBSs and study their monitorability [16]; -(ii) decentralize observers/monitors according to the system architecture by using decentralized runtime verification frameworks [6,15,13]; -(iii) adapt techniques for runtime enforcement [20] of sequential CBSs [18] to the distributed setting; -(iv) use heteregoneous communication primitives (synchronous and asynchronous) [25] for facilitating the implementation of optimized monitors; -(v) leverage aspect-oriented programming on CBSs [14] to define source-to-source transformations to inject runtime verification monitors.…”
Section: Discussionmentioning
confidence: 99%
“…In [24,39], Charafeddine et al propose enforcement mechanism with k-step rollback abilities. Such enforcement mechanism allows the system to deviate from the desired property up to k observable execution steps.…”
Section: Models Of Enforcement Mechanisms/monitorsmentioning
confidence: 99%
“…Intuitively, the supervisor is composed with an automaton model of the system (synchronous product) and ensures the most permissive behaviour of the initial system while preventing bad behaviour (rejected by the automaton). Should the system try to execute References Models of enforcement mechanisms Specification formalisms used for synthesis [88] security automata Büchi automata [62] edit-automata deterministic finite-state automata [37] generalised enforcement monitors Streett automata [20] edit automata Rabin automata [76] delayers timed automata [40] delayers with suppression timed automata [65] security automata µ-calculus formulae [42] generalised enforcement monitors labelled transition systems [39] enforcement mechanisms with rollback finite-state automata [15] safety shields safety automata [92] shields for burst errors temporal logic (safety) [13] iteration suppression automata deterministic finite-state automata an action that could lead the system to exhibit a bad behaviour, the supervisor disables this action which then cannot execute on the system anymore.…”
Section: Introduction and Definitionsmentioning
confidence: 99%