An overview of the MOP runtime verification framework

PON Meredith, D Jin, D Griffith, F Chen… - International Journal on …, 2012 - Springer
This article gives an overview of the, monitoring oriented programming framework (MOP). In
MOP, runtime monitoring is supported and encouraged as a fundamental principle for …

A taxonomy and catalog of runtime software-fault monitoring tools

N Delgado, AQ Gates, S Roach - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
A goal of runtime software-fault monitoring is to observe software behavior to determine
whether it complies with its intended behavior. Monitoring allows one to analyze and recover …

Edit automata: Enforcement mechanisms for run-time security policies

J Ligatti, L Bauer, D Walker - International Journal of Information Security, 2005 - Springer
We analyze the space of security policies that can be enforced by monitoring and modifying
programs at run time. Our program monitors, called edit automata, are abstract machines …

Run-time enforcement of nonsafety policies

J Ligatti, L Bauer, D Walker - ACM Transactions on Information and …, 2009 - dl.acm.org
A common mechanism for ensuring that software behaves securely is to monitor programs at
run time and check that they dynamically adhere to constraints specified by a security policy …

Spatio-temporal event model for cyber-physical systems

Y Tan, MC Vuran, S Goddard - 2009 29th IEEE International …, 2009 - ieeexplore.ieee.org
The emerging cyber-physical systems (CPSs) are envisioned to integrate computation,
communication and control with the physical world. Therefore, CPS requires close …

Java-MaC: a run-time assurance tool for Java programs

M Kim, S Kannan, I Lee, O Sokolsky… - Electronic Notes in …, 2001 - Elsevier
We describe Java-MaC, a prototype implementation of the Monitoring and Checking (MaC)
architecture for Java programs. The MaC architecture provides assurance about the correct …

JavaMOP: Efficient parametric runtime monitoring framework

D Jin, PON Meredith, C Lee… - 2012 34th International …, 2012 - ieeexplore.ieee.org
Runtime monitoring is a technique usable in all phases of the software development cycle,
from initial testing, to debugging, to actually maintaining proper function in production code …

Composing security policies with polymer

L Bauer, J Ligatti, D Walker - Proceedings of the 2005 ACM SIGPLAN …, 2005 - dl.acm.org
We introduce a language and system that supports definition and composition of complex
run-time security policies for Java applications. Our policies are comprised of two sorts of …

[PDF][PDF] More enforceable security policies

L Bauer, J Ligatti, D Walker - … of the Workshop on Foundations of …, 2002 - cs.princeton.edu
We analyze the space of security policies that can be enforced by monitoring programs at
runtime. Our program monitors are automata that examine the sequence of program actions …

Data placement for scientific applications in distributed environments

A Chervenak, E Deelman, M Livny… - 2007 8th IEEE/ACM …, 2007 - ieeexplore.ieee.org
Scientific applications often perform complex computational analyses that consume and
produce large data sets. We are concerned with data placement policies that distribute data …