Bounded-Memory Runtime Enforcement

被引:1
作者
Shankar, Saumya [1 ]
Rollet, Antoine [2 ]
Pinisetty, Srinivas [1 ]
Falcone, Ylies [3 ]
机构
[1] Indian Inst Technol, Bhubaneswar, India
[2] Univ Bordeaux, CNRS, Bordeaux INP, LaBRI,UMR 5800, F-33400 Talence, France
[3] Univ Grenoble Alpes, CNRS, Inria, Grenoble INP,LIG, F-38000 Grenoble, France
来源
MODEL CHECKING SOFTWARE, SPIN 2022 | 2022年 / 13255卷
基金
欧盟地平线“2020”;
关键词
Formal methods; Runtime enforcement; Automata; TIMED PROPERTIES;
D O I
10.1007/978-3-031-15077-7_7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Runtime Enforcement (RE) is a monitoring technique to ensure that a system obeys a set of formal requirements (properties). RE employs an enforcer (a safety wrapper for the system) which modifies the (untrustworthy) output by performing actions such as delaying (by storing/buffering) and suppressing events, when needed. In this paper, to handle practical applications with memory constraints, we propose a new RE paradigm where the memory of the enforcer is bounded/finite. Besides the property to be enforced, the user specifies a bound on the enforcer memory. Bounding the memory poses various challenges such as how to handle the situation when the memory is full, how to optimally discard events from the buffer to accommodate new events and let the enforcer continue operating. We define the bounded-memory RE problem and develop a framework for any regular property. The proposed framework is implemented and its performance evaluated via some examples from application scenarios indicates that the enforcer has reasonable execution time overhead.
引用
收藏
页码:114 / 133
页数:20
相关论文
共 23 条
[1]   Security policies enforcement using finite and pushdown edit automata [J].
Beauquier, Daniele ;
Cohen, Joelle ;
Lanotte, Ruggero .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (04) :319-336
[2]  
Bielova N, 2011, LECT NOTES COMPUT SC, V6542, P73, DOI 10.1007/978-3-642-19125-1_6
[3]  
Bloem Roderick, 2015, Tools and Algorithms for the Construction and Analysis of Systems. 21st International Conference, TACAS 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015. Proceedings: LNCS 9035, P533, DOI 10.1007/978-3-662-46681-0_51
[4]   Modeling runtime enforcement with mandatory results automata [J].
Dolzhenko, Egor ;
Ligatti, Jay ;
Reddy, Srikar .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) :47-60
[5]  
Falcone Ylies, 2018, Lectures on Runtime. Verification Introductory and Advanced Topics. LNCS 10457, P103, DOI 10.1007/978-3-319-75632-5_4
[6]   What can you verify and enforce at runtime? [J].
Falcone, Yliès ;
Fernandez, Jean-Claude ;
Mounier, Laurent .
International Journal on Software Tools for Technology Transfer, 2012, 14 (03) :349-382
[7]   Runtime enforcement of regular timed properties by suppressing and delaying events [J].
Falcone, Ylies ;
Jeron, Thierry ;
Marchand, Herve ;
Pinisetty, Srinivas .
SCIENCE OF COMPUTER PROGRAMMING, 2016, 123 :2-41
[8]   Runtime enforcement monitors: composition, synthesis, and enforcement abilities [J].
Falcone, Ylies ;
Mounier, Laurent ;
Fernandez, Jean-Claude ;
Richier, Jean-Luc .
FORMAL METHODS IN SYSTEM DESIGN, 2011, 38 (03) :223-262
[9]  
Falcone Y, 2009, LECT NOTES COMPUT SC, V5779, P40, DOI 10.1007/978-3-642-04694-0_4
[10]  
Fong PWL, 2004, P IEEE S SECUR PRIV, P43