A brief account of runtime verification

M Leucker, C Schallhart - The journal of logic and algebraic programming, 2009 - Elsevier
In this paper, a brief account of the field of runtime verification is given. Starting with a
definition of runtime verification, a comparison to well-known verification techniques like …

Automatic generation of object usage specifications from large method traces

M Pradel, TR Gross - 2009 IEEE/ACM International Conference …, 2009 - ieeexplore.ieee.org
Formal specifications are used to identify programming errors, verify the correctness of
programs, and as documentation. Unfortunately, producing them is error-prone and time …

Parametric trace slicing and monitoring

F Chen, G Roşu - International Conference on Tools and Algorithms for …, 2009 - Springer
Abstract Analysis of execution traces plays a fundamental role in many program analysis
approaches. Execution traces are frequently parametric, ie, they contain events with …

Runtime verification of safety-progress properties

Y Falcone, JC Fernandez, L Mounier - International Workshop on Runtime …, 2009 - Springer
The underlying property, its definition and representation play a major role when monitoring
a system. Having a suitable and convenient framework to express properties is thus a …

Runtime monitoring of web service conversations

J Simmonds, Y Gan, M Chechik, S Nejati… - IEEE Transactions …, 2009 - ieeexplore.ieee.org
For a system of distributed processes, correctness can be ensured by (statically) checking
whether their composition satisfies properties of interest. However, Web services are …

Handling mixed-criticality in SoC-based real-time embedded systems

R Pellizzoni, P Meredith, MY Nam, M Sun… - Proceedings of the …, 2009 - dl.acm.org
System-on-Chip (SoC) is a promising paradigm to implement safety-critical embedded
systems, but it poses significant challenges from a design and verification point of view. In …

Security test generation using threat trees

A Marback, H Do, K He… - 2009 ICSE Workshop …, 2009 - ieeexplore.ieee.org
Software security issues have been a major concern to the cyberspace community, so a
great deal of research on security testing has been performed, and various security testing …

Efficient formalism-independent monitoring of parametric properties

F Chen, PON Meredith, D Jin… - 2009 IEEE/ACM …, 2009 - ieeexplore.ieee.org
Parametric properties provide an effective and natural means to describe object-oriented
system behaviors, where the parameters are typed by classes and bound to object instances …

DMaC: Distributed Monitoring and Checking

W Zhou, O Sokolsky, BT Loo, I Lee - … , RV 2009, Grenoble, France, June 26 …, 2009 - Springer
We consider monitoring and checking formally specified properties in a network. We are
addressing the problem of deploying the checkers on different network nodes that provide …

Rule systems for runtime verification: A short tutorial

H Barringer, K Havelund, D Rydeheard… - Runtime Verification: 9th …, 2009 - Springer
In this tutorial, we introduce two rule-based systems for on and off-line trace analysis, RuleR
and LogScope. RuleR is a conditional rule-based system, which has a simple and easily …