Compositional runtime enforcement revisited

被引:1
作者
Pinisetty, Srinivas [1 ]
Pradhan, Ankit [1 ]
Roop, Partha [2 ]
Tripakis, Stavros [3 ]
机构
[1] IIT Bhubaneswar, Bhubaneswar, India
[2] Univ Auckland, Auckland, New Zealand
[3] Northeastern Univ, Khoury Coll Comp Sci, Boston, MA 02115 USA
基金
美国国家科学基金会;
关键词
Runtime monitoring; Runtime enforcement; Compositionality; Monitor synthesis; TIMED PROPERTIES; SYSTEMS;
D O I
10.1007/s10703-022-00401-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Runtime enforcement is a methodology used to enforce that the output of a running system satisfies a desired property. Given a property, an enforcement monitor modifies an (untrusted) sequence of events into a sequence that complies to that property. In practice, we may have not one, but many properties to enforce. Moreover, new properties may arise as new capabilities are added to the system. It is thus important to construct not a single, i.e., monolithic monitor, but rather several monitors, one for each property. The question is to what extent such monitors can be composed, and how. In this paper, we study two enforcement monitor composition schemes, serial and parallel composition. We show that, runtime enforcement is compositional for general regular properties with respect to one of the parallel composition schemes defined. We also show that runtime enforcement is not compositional with respect to serial composition for general regular properties, but it is for certain subclasses of regular properties. The proposed compositional runtime enforcement framework is formalized and implemented. Our experimental results demonstrate the pros and cons of using the compositional approach versus the monolithic with respect to performance.
引用
收藏
页码:205 / 252
页数:48
相关论文
共 50 条
  • [31] Runtime Enforcement of Information Flow Security in Tree Manipulating Processes
    Kovacs, Mate
    Seidl, Helmut
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 46 - 59
  • [32] Runtime Enforcement of Security Policies on Black Box Reactive Programs
    Ngo, Minh
    Massacci, Fabio
    Milushev, Dimiter
    Piessens, Frank
    ACM SIGPLAN NOTICES, 2015, 50 (01) : 43 - 54
  • [33] Runtime enforcement of regular timed properties by suppressing and delaying events
    Falcone, Ylies
    Jeron, Thierry
    Marchand, Herve
    Pinisetty, Srinivas
    SCIENCE OF COMPUTER PROGRAMMING, 2016, 123 : 2 - 41
  • [34] Runtime Verification and Enforcement, the (Industrial) Application Perspective (Track Introduction)
    Bartocci, Ezio
    Falcone, Ylies
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: DISCUSSION, DISSEMINATION, APPLICATIONS, ISOLA 2016, PT II, 2016, 9953 : 333 - 338
  • [35] Controlling Interactions with Libraries in Android Apps Through Runtime Enforcement
    Riganelli, Oliviero
    Micucci, Daniela
    Mariani, Leonardo
    ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2019, 14 (02)
  • [36] A non-intrusive runtime enforcement on behaviors of open supervisory control and data acquisition systems
    Mao, Yan-Fang
    Zhang, Yang
    Chen, Jun-Liang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (08):
  • [37] Adaptive Industrial Control Systems via IEC 61499 and Runtime Enforcement
    Faqrizal, Irman
    Salaün, Gwen
    Falcone, Yliès
    ACM Transactions on Autonomous and Adaptive Systems, 2024, 19 (04)
  • [38] On first-order runtime enforcement of branching-time properties
    Aceto, Luca
    Cassar, Ian
    Francalanza, Adrian
    Ingolfsdottir, Anna
    ACTA INFORMATICA, 2023, 60 (04) : 385 - 451
  • [39] Towards a Security Framework for Artifact-centric Workflows Leveraging Runtime Enforcement
    Gupta, Gaurav
    Shankar, Saumya
    Pinisetty, Srinivas
    JOURNAL OF OBJECT TECHNOLOGY, 2024, 23 (02):
  • [40] Fully automated runtime enforcement of component-based systems with formal and sound recovery
    Falcone, Ylies
    Jaber, Mohamad
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2017, 19 (03) : 341 - 365