Predictive runtime verification of timed properties

被引:37
作者
Pinisetty, Srinivas [1 ]
Jeron, Thierry [2 ]
Tripakis, Stavros [1 ,3 ]
Falcone, Ylies [4 ]
Marchand, Herve [2 ]
Preoteasa, Viorel [1 ]
机构
[1] Aalto Univ, Espoo, Finland
[2] INRIA Rennes Bretagne Atlantique, Campus Beaulieu, F-35042 Rennes, France
[3] Univ Calif Berkeley, Berkeley, CA 94720 USA
[4] Univ Grenoble Alpes, INRIA, LIG, F-38000 Grenoble, France
基金
美国国家科学基金会; 芬兰科学院;
关键词
Monitoring; Runtime verification; Timed automata; Real-time systems; ENFORCEMENT;
D O I
10.1016/j.jss.2017.06.060
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Runtime verification (RV) techniques are used to continuously check whether the (un-trustworthy) output of a black-box system satisfies or violates a desired property. When we consider runtime verification of timed properties, physical time elapsing between actions influences the satisfiability of the property. This paper introduces predictive runtime verification of timed properties where the system is not entirely a black-box but something about its behaviour is known a priori. A priori knowledge about the behaviour of the system allows the verification monitor to foresee the satisfaction (or violation) of the monitored property. In addition to providing a conclusive verdict earlier, the verification monitor also provides additional information such as the minimum (maximum) time when the property can be violated (satisfied) in the future. The feasibility of the proposed approach is demonstrated by a prototype implementation, which is able to synthesize predictive runtime verification monitors from timed automata. (C) 2017 Published by Elsevier Inc.
引用
收藏
页码:353 / 365
页数:13
相关论文
共 42 条
[1]   A THEORY OF TIMED AUTOMATA [J].
ALUR, R ;
DILL, DL .
THEORETICAL COMPUTER SCIENCE, 1994, 126 (02) :183-235
[2]  
[Anonymous], 2000, IEEE MED CONTR C
[3]  
[Anonymous], 2016, Predictive runtime enforcement, DOI DOI 10.1145/2851613.2851827
[4]  
Baler C., 2009, AUT LANG PROGR 36 IN, P43, DOI [10.1007/978-3-642-02930-1_4, DOI 10.1007/978-3-642-02930-1_4]
[5]  
Basin David, 2012, Runtime Verification, P260, DOI [DOI 10.1007/978-3-642-29860-820, 10.1007/978-3-642-29860-8_20, DOI 10.1007/978-3-642-29860-8_20]
[6]  
Bauer Andreas, 2012, NASA Formal Methods. Proceedings of the 4th International Symposium, NFM 2012, P174, DOI 10.1007/978-3-642-28891-3_18
[7]  
Bauer A, 2007, LECT NOTES COMPUT SC, V4839, P126
[8]   Runtime Verification for LTL and TLTL [J].
Bauer, Andreas ;
Leucker, Martin ;
Schallhart, Christian .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2011, 20 (04)
[9]   Comparing LTL Semantics for Runtime Verification [J].
Bauer, Andreas ;
Leucker, Martin ;
Schallhart, Christian .
JOURNAL OF LOGIC AND COMPUTATION, 2010, 20 (03) :651-674
[10]   Testing Conformance of Real-Time Applications by Automatic Generation of Observers [J].
Bensalem, Saddek ;
Bozga, Marius ;
Krichen, Moez ;
Tripakis, Stavros .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 113 :23-43