Anticipatory active monitoring for safety-and security-critical software

被引:0
|
作者
Martin LEUCKER [1 ]
机构
[1] Institute of Software Technology and Programming Languages,University of Lbeck
基金
中国国家自然科学基金;
关键词
active monitoring; runtime verification; anticipation; software safety; software security;
D O I
暂无
中图分类号
TP311.53 [];
学科分类号
081202 ; 0835 ;
摘要
Since formal verification and testing of systems is normally faced with challenges such as state explosion and uncertain execution environments,it is extremely difficult to exhaustively verify and test software during the development phase.Therefore,monitoring has become an indispensable means for finding latent software faults at runtime.Most current monitoring approaches only generate passive monitors,which cannot foresee possible faults and consequently cannot prevent their occurrence.In this paper,we propose an active monitoring approach based on runtime verification.This approach aims to predict possible incoming violations using a monitor that executes anticipatory semantics of temporal logic,and then generates the necessary steering actions according to a partial system model,which steers the system away from paths causing these violations.In this case,the monitor and monitored system make up a discrete feedback control loop.We further investigate the control theory behind active monitoring so that non-blocking controllability can be achieved.The results of applying active monitoring to two cases,a railway crossing control system and security-enhanced Linux(SELinux),show that the method can effectively ensure both safety and security properties at runtime.
引用
收藏
页码:2723 / 2737
页数:15
相关论文
共 50 条
  • [41] iOS Encryption Systems Deploying iOS Devices in Security-critical Environments
    Teufl, Peter
    Zefferer, Thomas
    Stromberger, Christof
    Hechenblaikner, Christoph
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 170 - 182
  • [42] Risk-driven development of security-critical systems using UMLsec
    Jürjens, J
    [J]. INFORMATION TECHNOLOGY: SELECTED TUTORIALS, 2004, 157 : 21 - 53
  • [43] Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems
    Zuo, Jinxin
    Lu, Yueming
    Gao, Hui
    Peng, Tong
    Guo, Ziyv
    An, Tong
    Litt, Enjie
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 2579 - 2595
  • [44] A Comprehensive Design-for-Test Infrastructure in the Context of Security-Critical Applications
    Saeed, Samah Mohamed
    Sinanoglu, Ozgur
    [J]. IEEE DESIGN & TEST, 2017, 34 (01) : 57 - 64
  • [46] Abstracting Security-Critical Applications for Model Checking in a Model-Driven Approach
    Borek, Marian
    Stenzel, Kurt
    Katkalov, Kuzman
    Reif, Wolfgang
    [J]. PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 11 - 14
  • [47] Safety Critical Software and Security - How Low Can You Go?
    Bernsmed, Karin
    Jaatun, Martin Gilje
    Meland, Per Hakon
    [J]. 2018 IEEE/AIAA 37TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2018, : 210 - 215
  • [48] Model Checking of Security-Critical Applications in a Model-Driven Approach
    Borek, Marian
    Moebius, Nina
    Stenzel, Kurt
    Reif, Wolfgang
    [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2013, 2013, 8137 : 76 - 90
  • [49] Generating Formal Specifications for Security-Critical Applications - A Model-Driven Approach
    Moebius, Nina
    Stenzel, Kurt
    Reif, Wolfgang
    [J]. 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 68 - 74
  • [50] A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services
    Mulamba, Dieudonne
    Amarnath, Athith
    Bezawada, Bruhadeshwar
    Ray, Indrajit
    [J]. PROCEEDINGS OF THE 5TH ACM WORKSHOP ON MOVING TARGET DEFENSE (MTD'18), 2018, : 59 - 68