Linear-time temporal logic guided greybox fuzzing

R Meng, Z Dong, J Li, I Beschastnikh… - Proceedings of the 44th …, 2022 - dl.acm.org
Software model checking as well as runtime verification are verification techniques which
are widely used for checking temporal properties of software systems. Even though they are …

Demystifying and Checking Silent Semantic Violations in Large Distributed Systems

C Lou, Y Jing, P Huang - … Symposium on Operating Systems Design and …, 2022 - usenix.org
Distributed systems today offer rich features with numerous semantics that users depend on.
Bugs can cause a system to silently violate its semantics without apparent anomalies. Such …

A Monitoring Tool for Linear-Time HML

L Aceto, A Achilleos, DP Attard, L Exibard… - … Languages and Models, 2022 - Springer
We present the implementation of a prototype tool that runtime checks specifications written
in a maximally-expressive safety fragment of the linear-time modal μ-calculus called MAX …

Assumption-based runtime verification

A Cimatti, C Tian, S Tonetta - Formal Methods in System Design, 2022 - Springer
Runtime Verification is a lightweight automatic verification technique. We introduce
Assumption-Based Runtime Verification framework, which is capable for monitoring partially …

[PDF][PDF] A promise is not a promise—demystifying and checking silent semantic violations in large distributed systems

C Lou, Y Jing, P Huang - 2022 - orderlab.io
Distributed systems today offer rich features with numerous semantics that users depend on.
Bugs can cause a system to silently violate its semantics without apparent anomalies. Such …

RVprio: A tool for prioritizing runtime verification violations

L Cabral, B Miranda, I Lima… - … Testing, Verification and …, 2022 - Wiley Online Library
Runtime verification (RV) helps to find software bugs by monitoring formally specified
properties during testing. A key problem in using RV during testing is how to reduce the …

Towards assessing isolation properties in partitioning hypervisors

C Cesarano, D Cotroneo… - 2022 IEEE international …, 2022 - ieeexplore.ieee.org
Partitioning hypervisor solutions are becoming increasingly popular, to ensure stringent
security and safety requirements related to isolation between co-hosted applications and to …

Creating concise and efficient dynamic analyses with ALDA

X Cheng, D Devecsery - Proceedings of the 27th ACM International …, 2022 - dl.acm.org
Dynamic program analyses are essential to creating safe, reliable, and productive
computing environments. However, these analyses are challenging and time-consuming to …

RVSec: Runtime verification methods for high precision detection of cryptography API misuse

ARF Torres - 2022 - rlbea.unb.br
O uso incorreto de APIs de criptografia pode causar vulnerabilidades em software. Portanto,
recentemente, foram propostas ferramentas baseadas em análise estática para detecção de …

ArchTacRV: Detecting and Runtime Verifying Architectural Tactics in Code

N Ge, Z Wang, L Zhang, J Zhao… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
A software architectural tactic is a design decision for realizing quality goals at the
architectural level. With the evolution of code, the designed architectural tactics might be …