Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
HighGuard: Cross-Chain Business Logic Monitoring of Smart Contracts
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 2378–2381https://doi.org/10.1145/3691620.3695356Logical flaws in smart contracts are often exploited, leading to significant financial losses. Our tool, HighGuard, detects transactions that violate business logic specifications of smart contracts. HighGuard employs dynamic condition response (DCR) ...
- research-articleOctober 2024
Towards Measuring Digital Twins Fidelity at Runtime
MODELS Companion '24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and SystemsPages 507–512https://doi.org/10.1145/3652620.3688267This paper introduces a novel approach for runtime validation and anomaly detection in Digital Twins. We enhance the trace alignment capabilities of the Needleman-Wunsch dynamic programming algorithm to enable continuous system state monitoring. Our ...
- research-articleJuly 2024
PathSpotter: Exploring Tested Paths to Discover Missing Tests
FSE 2024: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software EngineeringPages 647–651https://doi.org/10.1145/3663529.3663816When creating test cases, ideally, developers should test both the expected and unexpected behaviors of the program to catch more bugs and avoid regressions. However, the literature has provided evidence that developers are more likely to test expected ...
- research-articleJuly 2024
Test Polarity: Detecting Positive and Negative Tests
FSE 2024: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software EngineeringPages 537–541https://doi.org/10.1145/3663529.3663793Positive tests (aka, happy path tests) cover the expected behavior of the program, while negative tests (aka, unhappy path tests) check the unexpected behavior. Ideally, test suites should have both positive and negative tests to better protect against ...
- research-articleJuly 2024
Monitoring the Execution of 14K Tests: Methods Tend to Have One Path That Is Significantly More Executed
FSE 2024: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software EngineeringPages 532–536https://doi.org/10.1145/3663529.3663792The literature has provided evidence that developers are likely to test some behaviors of the program and avoid other ones. Despite this observation, we still lack empirical evidence from real-world systems. In this paper, we propose to automatically ...
-
- research-articleMay 2024
SpotFlow: Tracking Method Calls and States at Runtime
ICSE-Companion '24: Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion ProceedingsPages 35–39https://doi.org/10.1145/3639478.3640029Understanding the runtime behavioral aspects of a software system is fundamental for several software engineering tasks, such as testing and code comprehension. For this purpose, typically, one needs to instrument the system and collect data from its ...
- short-paperMay 2024
Towards Combining STPA and Safety-Critical Runtime Monitoring
ICSE-Companion '24: Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion ProceedingsPages 252–254https://doi.org/10.1145/3639478.3639794The dependence on software in safety-critical system is increasingly growing and the reliability of the systems becomes more and more critical. Therefore, we need to adapt software engineering concepts like DevOps to also be able to react to changes ...
- research-articleDecember 2023
QTWTL: Quality Aware Time Window Temporal Logic for Performance Monitoring
MEMOCODE '23: Proceedings of the 21st ACM-IEEE International Conference on Formal Methods and Models for System DesignPages 90–99https://doi.org/10.1145/3610579.3611075In various service-oriented applications such as distributed autonomous delivery, healthcare, tourism, transportation, and many others, where service agents need to perform serial and time-bounded tasks to achieve their goals, quality of service must ...
- research-articleJuly 2023
System Verification and Runtime Monitoring with Multiple Weakly-Hard Constraints
- Yi-Ting Hsieh,
- Tzu-Tao Chang,
- Chen-Jun Tsai,
- Shih-Lun Wu,
- Ching-Yuan Bai,
- Kai-Chieh Chang,
- Chung-Wei Lin,
- Eunsuk Kang,
- Chao Huang,
- Qi Zhu
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 7, Issue 3Article No.: 21, Pages 1–28https://doi.org/10.1145/3603380A weakly-hard fault model can be captured by an (m,k) constraint, where 0≤ m≤ k, meaning that there are at most m bad events (faults) among any k consecutive events. In this article, we use a weakly-hard fault model to constrain the occurrences of faults ...
- ArticleApril 2023
Explainable Online Monitoring of Metric Temporal Logic
Tools and Algorithms for the Construction and Analysis of SystemsPages 473–491https://doi.org/10.1007/978-3-031-30820-8_28AbstractRuntime monitors analyze system execution traces for policy compliance. Monitors for propositional specification languages, such as metric temporal logic (MTL), produce Boolean verdicts denoting whether the policy is satisfied or violated at a ...
- posterOctober 2022
Flexible model-driven runtime monitoring support for cyber-physical systems
ICSE '22: Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: Companion ProceedingsPages 350–351https://doi.org/10.1145/3510454.3528647Providing adequate runtime monitoring is critical for ensuring safe operation and for enabling self-adaptive behavior of Cyber-Physical Systems. This requires identifying runtime properties of interest, creating Probes to instrument the system, and ...
- research-articleFebruary 2023
Towards flexible runtime monitoring support for ROS-based applications
RoSE '22: Proceedings of the 4th International Workshop on Robotics Software EngineeringPages 43–46https://doi.org/10.1145/3526071.3527515Robotic systems are becoming common in different domains and for various purposes, such as unmanned aerial vehicles performing search and rescue operations, or robots operating in manufacturing plants. Such systems are characterized by close ...
- research-articleDecember 2021
A secure insulin infusion system using verification monitors
MEMOCODE '21: Proceedings of the 19th ACM-IEEE International Conference on Formal Methods and Models for System DesignPages 56–65https://doi.org/10.1145/3487212.3487342Wearable and implantable medical devices are being increasingly deployed for diagnosis, monitoring, and to provide therapy for critical medical conditions. Such medical devices are examples of safety-critical, cyber-physical systems. In this paper we ...
- research-articleNovember 2021
Monilogging for executable domain-specific languages
SLE 2021: Proceedings of the 14th ACM SIGPLAN International Conference on Software Language EngineeringPages 2–15https://doi.org/10.1145/3486608.3486906Runtime monitoring and logging are fundamental techniques for analyzing and supervising the behavior of computer programs. However, supporting these techniques for a given language induces significant development costs that can hold language engineers ...
- research-articleDecember 2021
Towards a model-integrated runtime monitoring infrastructure for cyber-physical systems
ICSE-NIER '21: Proceedings of the 43rd International Conference on Software Engineering: New Ideas and Emerging ResultsPages 96–100https://doi.org/10.1109/ICSE-NIER52604.2021.00028Runtime monitoring is essential for ensuring the safe operation and enabling self-adaptive behavior of Cyber-Physical Systems (CPS). It requires the creation of system monitors, instrumentation for data collection, and the definition of constraints. All ...
- posterMay 2021
Interval observer design of dynamical systems with neural networks
HSCC '21: Proceedings of the 24th International Conference on Hybrid Systems: Computation and ControlArticle No.: 30, Pages 1–2https://doi.org/10.1145/3447928.3456662This paper proposes an interval observer design method to construct lower-bound and upper-bound of system state trajectories in run time. The developed interval observer consists of two auxiliary neural networks derived from the neural network in ...
- posterApril 2021
Runtime verification of implantable medical devices using multiple physiological signals
SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied ComputingPages 1837–1840https://doi.org/10.1145/3412841.3442139The modern technological advances allow IMDs to be accessed and controlled wirelessly, making them more vulnerable to a variety of security attacks. In this work, we propose a new approach of dual input channel to the runtime monitor that takes both ECG ...
- research-articleFebruary 2021
A Hybrid Feature Location Technique for Re-engineeringSingle Systems into Software Product Lines
VaMoS '21: Proceedings of the 15th International Working Conference on Variability Modelling of Software-Intensive SystemsArticle No.: 11, Pages 1–9https://doi.org/10.1145/3442391.3442403Software product lines (SPLs) are known for improving productivity and reducing time-to-market through the systematic reuse of assets. SPLs are adopted mainly by re-engineering existing system variants. Feature location techniques (FLTs) support the re-...
- research-articleJanuary 2021
DIOXIN: runtime security policy enforcement of fog applications
International Journal of Grid and Utility Computing (IJGUC), Volume 12, Issue 2Pages 126–138https://doi.org/10.1504/ijguc.2021.114821Fog computing is an emerging distributed computational paradigm that moves the computation towards the edge (i.e., where data are produced). Although Fog operating systems provide basic security mechanisms, security controls over the behaviour of ...
- short-paperNovember 2020
Short Paper: Modular Black-box Runtime Verification of Security Protocols
PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for SecurityPages 19–22https://doi.org/10.1145/3411506.3417596Verification techniques have been applied to the design of secure protocols for decades. However, relatively few efforts have been made to ensure that verified designs are also implemented securely. Static code verification techniques offer one way to ...