Runtime Enforcement of Reactive Systems using Synchronous Enforcers

被引:15
作者
Pinisetty, Srinivas [1 ,2 ]
Roop, Partha S. [3 ]
Smyth, Steven [4 ]
Tripakis, Stavros [1 ,5 ]
von Hanxleden, Reinhard [4 ]
机构
[1] Aalto Univ, Helsinki, Finland
[2] Univ Gothenburg, Gothenburg, Sweden
[3] Univ Auckland, Auckland, New Zealand
[4] Univ Kiel, Kiel, Germany
[5] Univ Calif Berkeley, Berkeley, CA USA
来源
SPIN'17: PROCEEDINGS OF THE 24TH ACM SIGSOFT INTERNATIONAL SPIN SYMPOSIUM ON MODEL CHECKING OF SOFTWARE | 2017年
基金
瑞典研究理事会; 芬兰科学院; 美国国家科学基金会;
关键词
Runtime Monitoring; Runtime Enforcement; Safety Properties; Automata; Synchronous Programming; SCCharts;
D O I
10.1145/3092282.3092291
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Synchronous programming is a paradigm of choice for the design of safety-critical reactive systems. Runtime enforcement is a technique to ensure that the output of a black-box system satisfies some desired properties. This paper deals with the problem of runtime enforcement in the context of synchronous programs. We propose a framework where an enforcer monitors both the inputs and the outputs of a synchronous program and (minimally) edits erroneous inputs/outputs in order to guarantee that a given property holds. We define enforceability conditions, develop an online enforcement algorithm, and prove its correctness. We also report on an implementation of the algorithm on top of the KIELER framework for the SCCharts synchronous language. Experimental results show that enforcement has minimal execution time overhead, which decreases proportionally with larger benchmarks.
引用
收藏
页码:80 / 89
页数:10
相关论文
共 20 条
[1]   Software implementation of synchronous programs [J].
André, C ;
Boulanger, F ;
Girault, A .
SECOND INTERNATIONAL CONFERENCE ON APPLICATION OF CONCURRENCY TO SYSTEMS DESIGN, PROCEEDINGS, 2001, :133-142
[2]   The synchronous languages 12 years later [J].
Benveniste, A ;
Caspi, P ;
Edwards, SA ;
Halbwachs, N ;
Le Guernic, P ;
De Simone, R .
PROCEEDINGS OF THE IEEE, 2003, 91 (01) :64-83
[3]  
Berry G., 2000, ESTEREL V5 LANGUAGE
[4]  
Bloem Roderick, 2015, TACAS LNCS, V9035
[5]   Modeling runtime enforcement with mandatory results automata [J].
Dolzhenko, Egor ;
Ligatti, Jay ;
Reddy, Srikar .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) :47-60
[6]   Runtime enforcement monitors: composition, synthesis, and enforcement abilities [J].
Falcone, Ylies ;
Mounier, Laurent ;
Fernandez, Jean-Claude ;
Richier, Jean-Luc .
FORMAL METHODS IN SYSTEM DESIGN, 2011, 38 (03) :223-262
[7]  
Halbwachs Nicolas., 1994, Algebraic Methodology and Software Technology (AMAST'93), P83, DOI DOI 10.1007/978-1-4471-3227-1_8
[8]  
Jiang ZH, 2012, LECT NOTES COMPUT SC, V7214, P188, DOI 10.1007/978-3-642-28756-5_14
[9]   A brief account of runtime verification [J].
Leucker, Martin ;
Schallhart, Christian .
JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2009, 78 (05) :293-303
[10]   Run-Time Enforcement of Nonsafety Policies [J].
Ligatti, Jay ;
Bauer, Lujo ;
Walker, David .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)