Predictive runtime enforcement

被引:16
|
作者
Pinisetty, Srinivas [1 ]
Preoteasa, Viorel [1 ]
Tripakis, Stavros [1 ,2 ]
Jeron, Thierry [3 ]
Falcone, Ylies [4 ]
Marchand, Herve [3 ]
机构
[1] Aalto Univ, Espoo, Finland
[2] Univ Calif Berkeley, Berkeley, CA 94720 USA
[3] INRIA Rennes Bretagne Atlant, Rennes, France
[4] Univ Grenoble Alpes, Lab Informat Grenoble, Inria, LIG, F-38000 Grenoble, France
基金
美国国家科学基金会; 芬兰科学院;
关键词
Runtime monitoring; Runtime enforcement; Automata; Timed automata; Monitor synthesis; TIMED PROPERTIES;
D O I
10.1007/s10703-017-0271-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Runtime enforcement (RE) is a technique to ensure that the (untrustworthy) output of a black-box system satisfies some desired properties. In RE, the output of the running system, modeled as a sequence of events, is fed into an enforcer. The enforcer ensures that the sequence complies with a certain property, by delaying or modifying events if necessary. This paper deals with predictive runtime enforcement, where the system is not entirely black-box, but we know something about its behavior. This a priori knowledge about the system allows to output some events immediately, instead of delaying them until more events are observed, or even blocking them permanently. This in turn results in better enforcement policies. We also show that if we have no knowledge about the system, then the proposed enforcement mechanism reduces to standard (non-predictive) runtime enforcement. All our results related to predictive RE of untimed properties are also formalized and proved in the Isabelle theorem prover. We also discuss how our predictive runtime enforcement framework can be extended to enforce timed properties.
引用
收藏
页码:154 / 199
页数:46
相关论文
共 50 条
  • [41] Runtime Enforcement of Data-centric Properties for Concurrent Service-based Applications
    Wu, Guoquan
    Wei, Jun
    Zhong, Hua
    Huang, Tao
    2014 IEEE 21ST INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2014), 2014, : 401 - 408
  • [42] Runtime Enforcement of First-Order LTL Properties on Data-Aware Business Processes
    De Masellis, Riccardo
    Su, Jianwen
    SERVICE-ORIENTED COMPUTING, ICSOC 2013, 2013, 8274 : 54 - 68
  • [43] INVITED: Safety Guard: Runtime Enforcement for Safety-Critical Cyber-Physical Systems
    Wu, Meng
    Zeng, Haibo
    Wang, Chao
    Yu, Huafeng
    PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [44] Student Research Abstract: Enhancing Safety in Cyber-Physical Systems Through Runtime Enforcement
    Lopez-Miguel, Ignacio D.
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1614 - 1616
  • [45] Decentralized LTL Enforcement
    Gallay, Florian
    Falcone, Ylies
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2021, (346): : 135 - 151
  • [46] Runtime Monitoring of Component Changes with Spy@Runtime
    Ghezzi, Carlo
    Mocci, Andrea
    Sangiorgio, Mario
    2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 1403 - 1406
  • [47] DECENT: A Benchmark for Decentralized Enforcement
    Gallay, Florian
    Falcone, Ylies
    RUNTIME VERIFICATION (RV 2022), 2022, 13498 : 293 - 303
  • [48] Cooperative runtime monitoring
    Halle, Sylvain
    ENTERPRISE INFORMATION SYSTEMS, 2013, 7 (04) : 395 - 423
  • [49] Iterative enforcement by suppression: Towards practical enforcement theories
    Bielova, Nataliia
    Massacci, Fabio
    JOURNAL OF COMPUTER SECURITY, 2012, 20 (01) : 51 - 79
  • [50] Runtime Monitoring for Concurrent Systems
    Yamagata, Yoriyuki
    Artho, Cyrille
    Hagiya, Masami
    Inoue, Jun
    Ma, Lei
    Tanabe, Yoshinori
    Yamamoto, Mitsuharu
    RUNTIME VERIFICATION, (RV 2016), 2016, 10012 : 386 - 403