Fully automated runtime enforcement of component-based systems with formal and sound recovery

被引:0
作者
Yliès Falcone
Mohamad Jaber
机构
[1] Univ. Grenoble-Alpes,
[2] Inria,undefined
[3] LIG,undefined
[4] American University of Beirut,undefined
[5] CMPS,undefined
来源
International Journal on Software Tools for Technology Transfer | 2017年 / 19卷
关键词
Runtime enforcement; Component-based systems; Monitoring; -step enforceability; BIP;
D O I
暂无
中图分类号
学科分类号
摘要
We introduce runtime enforcement of specifications on component-based systems (CBS) modeled in the behavior, interaction and priority (BIP) framework. Runtime enforcement is an increasingly popular and effective dynamic validation technique aiming to ensure the correct runtime behavior (w.r.t. a formal specification) of a system using a so-called enforcement monitor. BIP is a powerful and expressive component-based framework for the formal construction of heterogeneous systems. Because of BIP expressiveness, however, it is difficult to enforce complex behavioral properties at design-time. We first introduce a theoretical runtime enforcement framework for component-based systems where we delineate a hierarchy of enforceable properties (i.e., properties that can be enforced) according to the number of observational steps a system is allowed to deviate from the property (i.e., the notion of k-step enforceability). To ensure the observational equivalence between the correct executions of the initial system and the monitored system, we show that (i) only stutter-invariant properties should be enforced on CBS with our monitors, and (ii) safety properties are 1-step enforceable. Second, given an abstract enforcement monitor for some 1-step enforceable property, we define a series of formal transformations to instrument (at relevant locations) a CBS described in the BIP framework to integrate the monitor. At runtime, the monitor observes and automatically avoids any error in the behavior of the system w.r.t. the property. Third, our approach is fully implemented in RE-BIP, an available tool integrated in the BIP tool suite. Fourth, to validate our approach, we use RE-BIP to (i) enforce deadlock-freedom on a dining philosophers benchmark, and (ii) ensure the correct placement of robots on a map.
引用
收藏
页码:341 / 365
页数:24
相关论文
共 43 条
  • [1] Alur R(1994)A theory of timed automata Theor. Comput. Sci. 126 183-235
  • [2] Dill DL(2013)Enforceable security policies revisited ACM Trans. Inf. Syst. Secur. 16 3-48
  • [3] Basin DA(2011)Rigorous component-based system design using the BIP framework IEEE Softw. 28 41-674
  • [4] Jugé V(2010)Comparing LTL semantics for runtime verification J. Logic Comput. 20 651-1330
  • [5] Klaedtke F(2008)The algebra of connectors–structuring interaction in BIP IEEE Trans. Comput. 57 1315-409
  • [6] Zalinescu E(2012)A framework for automated distributed implementation of component-based models Distrib. Comput. 25 383-382
  • [7] Basu A(2012)What can you verify and enforce at runtime? STTT 14 349-570
  • [8] Bensalem S(2015)Enforcement and validation (at runtime) of various notions of opacity Discrete Event Dyn. Syst. 25 531-262
  • [9] Bozga M(2011)Runtime enforcement monitors: composition, synthesis, and enforcement abilities Formal Methods Syst. Des. 38 223-19:41
  • [10] Combaz J(2009)Run-time enforcement of nonsafety policies ACM Trans. Inf. Syst. Secur. 12 19:1-120