scispace - formally typeset
Journal ArticleDOI

Rewriting-Based Techniques for Runtime Verification

Reads0
Chats0
TLDR
The presented work is part of an ambitious runtime verification and monitoring project at NASA Ames, called PathExplorer, and demonstrates that rewriting can be a tractable and attractive means for experimenting and implementing logics for program monitoring.
Abstract
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are infinite traces, finite traces appear naturally when testing and/or monitoring real applications that only run for limited time periods. A finite trace variant of LTL is formally defined, together with an immediate executable semantics which turns out to be quite inefficient if used directly, via rewriting, as a monitoring procedure. Then three algorithms are investigated. First, a simple synthesis algorithm for monitors based on dynamic programming is presented; despite the efficiency of the generated monitors, they unfortunately need to analyze the trace backwards, thus making them unusable in most practical situations. To circumvent this problem, two rewriting-based practical algorithms are further investigated, one using rewriting directly as a means for online monitoring, and the other using rewriting to generate automata-like monitors, called binary transition tree finite state machines (and abbreviated BTT-FSMs). Both rewriting algorithms are implemented in Maude, an executable specification language based on a very efficient implementation of term rewriting. The first rewriting algorithm essentially consists of a set of equations establishing an executable semantics of LTL, using a simple formula transforming approach. This algorithm is further improved to build automata on-the-fly via caching and reuse of rewrites (called memoization), resulting in a very efficient and small Maude program that can be used to monitor program executions. The second rewriting algorithm builds on the first one and synthesizes provably minimal BTT-FSMs from LTL formulae, which can then be used to analyze execution traces online without the need for a rewriting system. The presented work is part of an ambitious runtime verification and monitoring project at NASA Ames, called PathExplorer, and demonstrates that rewriting can be a tractable and attractive means for experimenting and implementing logics for program monitoring.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

An overview of the MOP runtime verification framework

TL;DR: An overview of the, monitoring oriented programming framework (MOP), and an explanation of parametric trace monitoring and its implementation is given.
Proceedings ArticleDOI

LOLA: runtime monitoring of synchronous systems

TL;DR: A specification language and algorithms for the online and offline monitoring of synchronous systems including circuits and embedded systems, and a class of specifications, characterized syntactically, for which the algorithm's memory requirement is independent of the length of the input streams.
Journal ArticleDOI

An Overview of the Runtime Verification Tool Java PathExplorer

TL;DR: An overview of the Java PathExplorer runtime verification tool, in short JPAX, which can monitor the execution of a Java program and check that it conforms with a set of user provided properties formulated in temporal logic.
Journal IssueDOI

Testing with model checkers: a survey

TL;DR: The state of the art in testing with model checkers is reviewed: many different approaches have been presented, many problems have been solved, yet many issues remain.
Book ChapterDOI

Introduction to runtime verification

TL;DR: The aim of this chapter is to act as a primer for those wanting to learn about Runtime Verification, providing an overview of the main specification languages used for RV and introducing the standard terminology necessary to describe the monitoring problem.
References
More filters
Book ChapterDOI

Experiments in Theorem Proving and Model Checking for Protocol Verification

TL;DR: This work describes a series of protocol verification experiments culminating in a methodology where theorem proving is used to abstract out the sources of unboundedness in the protocol to yield a skeletal protocol that can be verified using model checking.
BookDOI

Model Checking a Path (Preliminary Report)

TL;DR: It is shown that the problem of model checking a path can usually be solved efficiently, and profit from specialized algorithms, and it is possible to efficiently check paths given in compressed form.
Journal ArticleDOI

Model-checking multi-threaded distributed Java programs

TL;DR: It is described the design of a new tool for state-less state-space exploration of Java programs that incorporates a reduction that exploits a common pattern of synchronization, namely, the use of locks to protect shared data structures.
Journal ArticleDOI

Towards Monitoring-Oriented Programming: A Paradigm Combining Specification and Implementation

TL;DR: This paper presents a paradigm for combining formal specification with implementation, called monitoringoriented programming (MoP), providing a light-weighted formal method to check conformance of implementation to specification at runtime.
Journal ArticleDOI

A deadlock detection tool for concurrent Java programs

TL;DR: An abstract formal model is generated from the Java source using the Java2Spin translator, expressed in the PROMELA language, and the SPIN tool is used to perform its formal analysis.
Related Papers (5)