Runtime enforcement of timed properties revisited

被引:32
作者
Pinisetty, Srinivas [1 ]
Falcone, Ylies [2 ]
Jeron, Thierry [1 ]
Marchand, Herve [1 ]
Rollet, Antoine [3 ]
Timo, Omer Nguena [4 ]
机构
[1] INRIA Rennes Bretagne Atlantique, Rennes, France
[2] Univ Grenoble 1, Lab Informat Grenoble, Grenoble, France
[3] Univ Bordeaux, CNRS, LaBRI, Bordeaux, France
[4] CRIM, Montreal, PQ, Canada
关键词
Runtime verification; Runtime enforcement; Timed properties; Timed automata; Software engineering;
D O I
10.1007/s10703-014-0215-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Runtime enforcement is a powerful technique to ensure that a running system satisfies some desired properties. Using an enforcement monitor, an (untrustworthy) input execution (in the form of a sequence of events) is modified into an output sequence that complies with a property. Over the last decade, runtime enforcement has been mainly studied in the context of untimed properties. This paper deals with runtime enforcement of timed properties by revisiting the foundations of runtime enforcement when time between events matters. We propose a new enforcement paradigm where enforcement mechanisms are time retardants: to produce a correct output sequence, additional delays are introduced between the events of the input sequence. We consider runtime enforcement of any regular timed property defined by a timed automaton. We prove the correctness of enforcement mechanisms and prove that they enjoy two usually expected features, revisited here in the context of timed properties. The first one is soundness meaning that the output sequences (eventually) satisfy the required property. The second one is transparency, meaning that input sequences are modified in a minimal way. We also introduce two new features, (i) physical constraints that describe how a time retardant is physically constrained when delaying a sequence of timed events, and (ii) optimality, meaning that output sequences are produced as soon as possible. To facilitate the adoption and implementation of enforcement mechanisms, we describe them at several complementary abstraction levels. Our enforcement mechanisms have been implemented and our experimental results demonstrate the feasibility of runtime enforcement in a timed context and the effectiveness of the mechanisms.
引用
收藏
页码:381 / 422
页数:42
相关论文
共 27 条
[1]   A THEORY OF TIMED AUTOMATA [J].
ALUR, R ;
DILL, DL .
THEORETICAL COMPUTER SCIENCE, 1994, 126 (02) :183-235
[2]  
[Anonymous], 2003, COMP 18 ANN ACM SIGP
[3]  
[Anonymous], LNCS
[4]  
Barringer Howard, 2012, FM 2012: Formal Methods. Proceedings of the 18th International Symposium, P68, DOI 10.1007/978-3-642-32759-9_9
[5]   Enforceable Security Policies Revisited [J].
Basin, David ;
Juge, Vincent ;
Klaedtke, Felix ;
Zalinescu, Eugen .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2013, 16 (01)
[6]   Runtime Verification for LTL and TLTL [J].
Bauer, Andreas ;
Leucker, Martin ;
Schallhart, Christian .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2011, 20 (04)
[7]   Do you really mean what you actually enforced? [J].
Bielova, Nataliia ;
Massacci, Fabio .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (04) :239-254
[8]  
Chen F, 2009, LECT NOTES COMPUT SC, V5505, P246, DOI 10.1007/978-3-642-00768-2_23
[9]   LARVA - Safer Monitoring of Real-Time Java']Java Programs (Tool Paper) [J].
Colombo, Christian ;
Pace, Gordon J. ;
Schneider, Gerardo .
SEFM 2009: SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, 2009, :33-+
[10]  
Colombo C, 2009, LECT NOTES COMPUT SC, V5596, P135, DOI 10.1007/978-3-642-03240-0_13