Anticipatory active monitoring for safety- and security-critical software

被引:3
作者
Dong Wei [1 ]
Zhao ChangZhi [1 ]
Shu ShaoXian [1 ]
Leucker, Martin [2 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China
[2] Med Univ Lubeck, Inst Software Technol & Programming Languages, Lubeck, Germany
基金
中国国家自然科学基金;
关键词
active monitoring; runtime verification; anticipation; software safety; software security; RUNTIME VERIFICATION; TIME;
D O I
10.1007/s11432-012-4739-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since formal verification and testing of systems is normally faced with challenges such as state explosion and uncertain execution environments, it is extremely difficult to exhaustively verify and test software during the development phase. Therefore, monitoring has become an indispensable means for finding latent software faults at runtime. Most current monitoring approaches only generate passive monitors, which cannot foresee possible faults and consequently cannot prevent their occurrence. In this paper, we propose an active monitoring approach based on runtime verification. This approach aims to predict possible incoming violations using a monitor that executes anticipatory semantics of temporal logic, and then generates the necessary steering actions according to a partial system model, which steers the system away from paths causing these violations. In this case, the monitor and monitored system make up a discrete feedback control loop. We further investigate the control theory behind active monitoring so that non-blocking controllability can be achieved. The results of applying active monitoring to two cases, a railway crossing control system and security-enhanced Linux (SELinux), show that the method can effectively ensure both safety and security properties at runtime.
引用
收藏
页码:2723 / 2737
页数:15
相关论文
共 29 条
[1]  
[Anonymous], 2004, IBM REDBOOKS
[2]  
Bauer A, 2007, LECT NOTES COMPUT SC, V4839, P126
[3]  
Bauer A, 2006, LECT NOTES COMPUT SC, V4337, P260
[4]  
Bauer A, 2006, 2006 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, P243
[5]   Runtime Verification for LTL and TLTL [J].
Bauer, Andreas ;
Leucker, Martin ;
Schallhart, Christian .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2011, 20 (04)
[6]   Collaborative Runtime Verification with Tracematches [J].
Bodden, Eric ;
Hendren, Laurie ;
Lam, Patrick ;
Lhotak, Ondrej ;
Naeem, Nomair A. .
JOURNAL OF LOGIC AND COMPUTATION, 2010, 20 (03) :707-723
[7]   Course Evaluation Method Based on Analytic Hierarchy Process [J].
Zhao, Chunna ;
Zhao, Yu ;
Tan, Xiaohui ;
Li, Yingshun ;
Luo, Liming ;
Xiong, Yeqing .
2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL II, 2010, :318-321
[8]   MOP: An efficient and generic runtime verification framework [J].
Chen, Feng ;
Rosu, Grigore .
ACM SIGPLAN NOTICES, 2007, 42 (10) :569-588
[9]   LIMITED LOOKAHEAD POLICIES IN SUPERVISORY CONTROL OF DISCRETE EVENT SYSTEMS [J].
CHUNG, SL ;
LAFORTUNE, S ;
LIN, F .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1992, 37 (12) :1921-1935
[10]   LOLA:: Runtime monitoring of synchronous systems [J].
D'Angelo, B ;
Sankaranarayanan, S ;
Sánchez, C ;
Robinson, W ;
Finkbeiner, B ;
Sipma, HB ;
Mehrotra, S ;
Manna, Z .
12TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2005, :166-174