Anticipatory active monitoring for safety-and security-critical software

被引:0
|
作者
Martin LEUCKER [1 ]
机构
[1] Institute of Software Technology and Programming Languages,University of Lbeck
基金
中国国家自然科学基金;
关键词
active monitoring; runtime verification; anticipation; software safety; software security;
D O I
暂无
中图分类号
TP311.53 [];
学科分类号
081202 ; 0835 ;
摘要
Since formal verification and testing of systems is normally faced with challenges such as state explosion and uncertain execution environments,it is extremely difficult to exhaustively verify and test software during the development phase.Therefore,monitoring has become an indispensable means for finding latent software faults at runtime.Most current monitoring approaches only generate passive monitors,which cannot foresee possible faults and consequently cannot prevent their occurrence.In this paper,we propose an active monitoring approach based on runtime verification.This approach aims to predict possible incoming violations using a monitor that executes anticipatory semantics of temporal logic,and then generates the necessary steering actions according to a partial system model,which steers the system away from paths causing these violations.In this case,the monitor and monitored system make up a discrete feedback control loop.We further investigate the control theory behind active monitoring so that non-blocking controllability can be achieved.The results of applying active monitoring to two cases,a railway crossing control system and security-enhanced Linux(SELinux),show that the method can effectively ensure both safety and security properties at runtime.
引用
收藏
页码:2723 / 2737
页数:15
相关论文
共 50 条
  • [1] Anticipatory active monitoring for safety- and security-critical software
    Wei Dong
    ChangZhi Zhao
    ShaoXian Shu
    Martin Leucker
    [J]. Science China Information Sciences, 2012, 55 : 2723 - 2737
  • [2] Anticipatory active monitoring for safety- and security-critical software
    Dong Wei
    Zhao ChangZhi
    Shu ShaoXian
    Leucker, Martin
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (12) : 2723 - 2737
  • [3] Criteria for the Analysis of Gaps and Limitations of V&V Methods for Safety-and Security-Critical Systems
    Ferrari, Enrico
    Schlick, Rupert
    De la Vara, Jose Luis
    Folkesson, Peter
    Sangchoolie, Behrooz
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2022 WORKSHOPS, 2022, 13415 : 35 - 46
  • [4] Reducing Software Assurance Risks for Security-Critical and Safety-Critical Systems
    Axelrod, C. Warren
    [J]. 2014 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2014,
  • [5] Safety-critical and security-critical computing in Britain: An exploration
    MacKenzie, D
    Tierney, M
    [J]. TECHNOLOGY ANALYSIS & STRATEGIC MANAGEMENT, 1996, 8 (04) : 355 - 379
  • [6] Practical experiences of safety- and security-critical technologies
    Amey, Peter
    Hilton, Adrian J
    [J]. Ada User Journal, 2004, 25 (02): : 98 - 105
  • [7] The MISRA C Coding Standard and its Role in the Development and Analysis of Safety- and Security-Critical Embedded Software
    Bagnara, Roberto
    Bagnara, Abramo
    Hill, Patricia M.
    [J]. STATIC ANALYSIS (SAS 2018), 2018, 11002 : 5 - 23
  • [8] When Worlds Collide: Safety, Mission and Security-Critical System Engineering
    Fidge, Colin
    [J]. 2015 20TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2015, : XIV - XIV
  • [9] Domain Specific Modelling and Language for Safety-Critical and Security-Critical Requirements Engineering
    Sklyar, Vladimir
    Kharchenko, Vyacheslav
    [J]. 2022 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT), 2022,
  • [10] Prioritizing refactorings for security-critical code
    Chaima Abid
    Vahid Alizadeh
    Marouane Kessentini
    Mouna Dhaouadi
    Rick Kazman
    [J]. Automated Software Engineering, 2021, 28