Prioritizing runtime verification violations

B Miranda, I Lima, O Legunsen… - 2020 ieee 13th …, 2020 - ieeexplore.ieee.org
Runtime Verification (RV) can help find software bugs by monitoring formally specified
properties during testing. A key problem when using RV during testing is how to reduce the …

Runtime Verification of Contracts with Themulus

A Aranda García, ME Cambronero, C Colombo… - … Engineering and Formal …, 2020 - Springer
Contracts regulating the behaviour of multiple interacting parties go beyond the notion of
pure properties, but allow one to document and analyse the ideal behaviour. In this paper …

History-based specification and verification of Java collections in KeY

HDA Hiep, J Bian, FS de Boer, S de Gouw - Integrated Formal Methods …, 2020 - Springer
In this feasibility study we discuss reasoning about the correctness of Java interfaces using
histories, with a particular application to Java's Collection interface. We introduce a new …

A framework for supporting the development of verifiably safe medical best practice guideline systems

C Guo, Z Fu, Z Zhang, S Ren, L Sha - Journal of Systems Architecture, 2020 - Elsevier
Improving safety of patient care is an ultimate objective for medical systems. Though many
medical best practice guidelines exist and are in hospital handbooks, they are often lengthy …

Towards runtime verification via event stream processing in cloud computing infrastructures

D Cotroneo, L De Simone, P Liguori, R Natella… - … Conference on Service …, 2020 - Springer
Software bugs in cloud management systems often cause erratic behavior, hindering
detection, and recovery of failures. As a consequence, the failures are not timely detected …

Can determinism and compositionality coexist in RML?

D Ancona, A Ferrando, V Mascardi - arXiv preprint arXiv:2009.00391, 2020 - arxiv.org
Runtime verification (RV) consists in dynamically verifying that the event traces generated by
single runs of a system under scrutiny (SUS) are compliant with the formal specification of its …

The use of runtime verification for identifying and responding to cybersecurity threats posed to state actors during cyberwarfare

J Straub - 2020 International Conference on Computational …, 2020 - ieeexplore.ieee.org
This paper considers the utility of the use of runtime verification techniques for detecting and
responding to cybersecurity threats. To this end, it considers two questions: First, it evaluates …

Can determinism and compositionality coexist in RML?(extended version)

D Ancona, A Ferrando, V Mascardi - arXiv preprint arXiv:2008.06453, 2020 - arxiv.org
Runtime verification (RV) consists in dynamically verifying that the event traces generated by
single runs of a system under scrutiny (SUS) are compliant with the formal specification of its …

Four-Valued Monitorability of -Regular Languages

Z Chen, Y Chen, RM Hierons, Y Wu - International Conference on Formal …, 2020 - Springer
The use of runtime verification has led to interest in deciding whether a property is
monitorable: whether it is always possible for the satisfaction or violation of the property to …

Optimal Runtime Verification of Finite State Properties over Lossy Event Streams

P Kushwaha, R Purandare, MB Dwyer - arXiv preprint arXiv:2004.04214, 2020 - arxiv.org
Monitoring programs for finite state properties is challenging due to high memory and
execution time overheads it incurs. Some events if skipped or lost naturally can reduce both …