Skip to main content Accessibility help
×
Home
Hostname: page-component-5959bf8d4d-57lbh Total loading time: 0.44 Render date: 2022-12-08T00:00:20.296Z Has data issue: true Feature Flags: { "useRatesEcommerce": false } hasContentIssue true

Optimal enforcement of (timed) properties with uncontrollable events

Published online by Cambridge University Press:  29 May 2017

MATTHIEU RENARD
Affiliation:
LaBRI, Bordeaux INP, Université Bordeaux, Bordeaux, France Emails: matthieu.renard@labri.fr, antoine.rollet@labri.fr
YLIÈS FALCONE
Affiliation:
Univ. Grenoble-Alpes, Inria, Laboratoire d'Informatique de Grenoble, F-38000 Grenoble, France Email: Ylies.Falcone@univ-grenoble-alpes.fr
ANTOINE ROLLET
Affiliation:
LaBRI, Bordeaux INP, Université Bordeaux, Bordeaux, France Emails: matthieu.renard@labri.fr, antoine.rollet@labri.fr
THIERRY JÉRON
Affiliation:
Inria Rennes Bretagne-Atlantique, Rennes, France Emails: thierry.jeron@inria.fr, herve.marchand@inria.fr
HERVÉ MARCHAND
Affiliation:
Inria Rennes Bretagne-Atlantique, Rennes, France Emails: thierry.jeron@inria.fr, herve.marchand@inria.fr

Abstract

This paper deals with runtime enforcement of untimed and timed properties with uncontrollable events. Runtime enforcement consists in defining and using mechanisms that modify the executions of a running system to ensure their correctness with respect to a desired property. We introduce a framework that takes as input any regular (timed) property described by a deterministic automaton over an alphabet of events, with some of these events being uncontrollable. An uncontrollable event cannot be delayed nor intercepted by an enforcement mechanism. Enforcement mechanisms should satisfy important properties, namely soundness, compliance and optimality – meaning that enforcement mechanisms should output as soon as possible correct executions that are as close as possible to the input execution. We define the conditions for a property to be enforceable with uncontrollable events. Moreover, we synthesise sound, compliant and optimal descriptions of runtime enforcement mechanisms at two levels of abstraction to facilitate their design and implementation.

Type
Paper
Copyright
Copyright © Cambridge University Press 2017 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Alur, R. and Dill, D. (1992). The theory of timed automata. In: de Bakker, J., Huizing, C., de Roever, W. and Rozenberg, G. (eds.) Real-Time: Theory in Practice, Lecture Notes in Computer Science, vol. 600, Berlin Heidelberg: Springer, 4573.CrossRefGoogle Scholar
Basin, D., Jugé, V., Klaedtke, F. and Zălinescu, E. (2013). Enforceable security policies revisited. ACM Transactions on Information and System Security. 16 (1) 3:13:26.CrossRefGoogle Scholar
Basin, D., Klaedtke, F. and Zalinescu, E. (2011). Algorithms for monitoring real-time properties. In: Khurshid, S. and Sen, K. (eds.) Proceedings of the 2nd International Conference on Runtime Verification (RV 2011), Lecture Notes in Computer Science, vol. 7186, Springer-Verlag, 260275.Google Scholar
Bloem, R., Könighofer, B., Könighofer, R. and Wang, C. (2015). Shield synthesis: - Runtime enforcement for reactive systems. In: Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 533–548.Google Scholar
Charafeddine, H., El-Harake, K., Falcone, Y. and Jaber, M. (2015). Runtime enforcement for component-based systems. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015, 1789–1796.CrossRefGoogle Scholar
Colombo, C., Pace, G. J. and Schneider, G. (2009a). LARVA –- safer monitoring of real-time Java programs (tool paper). In: Hung, D.V. and Krishnan, P. (eds.) Proceedings of the 7th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2009), IEEE Computer Society, 3337.CrossRefGoogle Scholar
Colombo, C., Pace, G. J. and Schneider, G. (2009b). Safe runtime verification of real-time properties. In: Ouaknine, J. and Vaandrager, F.W. (eds.) Proceedings of the 7th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS 2009), Lecture Notes in Computer Science, vol. 5813, Springer, 103117.CrossRefGoogle Scholar
Dolzhenko, E., Ligatti, J. and Reddy, S. (2015). Modeling runtime enforcement with mandatory results automata. International Journal of Information Security 14 (1) 4760.CrossRefGoogle Scholar
Falcone, Y., Havelund, K. and Reger, G. (2013). A tutorial on runtime verification. In: Broy, M., Peled, D.A. and Kalus, G. (eds.) Engineering Dependable Software Systems, NATO Science for Peace and Security Series, D: Information and Communication Security, vol. 34, IOS Press, 141175.Google Scholar
Falcone, Y., Mounier, L., Fernandez, J. and Richier, J. (2011). Runtime enforcement monitors: Composition, synthesis, and enforcement abilities. Formal Methods in System Design 38 (3) 223262.CrossRefGoogle Scholar
Leucker, M. and Schallhart, C. (2009). A brief account of runtime verification. Journal of Logic Programming 78 (5) 293303.CrossRefGoogle Scholar
Ligatti, J., Bauer, L. and Walker, D. (2009). Run-time enforcement of nonsafety policies. ACM Transactions on Information and System Security 12 (3) 19:119:41.CrossRefGoogle Scholar
Pinisetty, S., Falcone, Y., Jéron, T. and Marchand, H. (2014a). Runtime enforcement of regular timed properties. In: Cho, Y., Shin, S.Y., Kim, S., Hung, C. and Hong, J. (eds.) Symposium on Applied Computing, SAC, Gyeongju, Republic of Korea: ACM, 12791286.Google Scholar
Pinisetty, S., Falcone, Y., Jéron, T. and Marchand, H. (2014b). Runtime enforcement of parametric timed properties with practical applications. In: Lesage, J., Faure, J., Cury, J.E.R. and Lennartson, B. (eds.) Proceedings of the 12th International Workshop on Discrete Event Systems, WODES, Cachan, France: International Federation of Automatic Control, 420427.Google Scholar
Pinisetty, S., Falcone, Y., Jéron, T., Marchand, H., Rollet, A. and Nguena-Timo, O. (2014c). Runtime enforcement of timed properties revisited. Formal Methods in System Design 45 (3) 381422.CrossRefGoogle Scholar
Pinisetty, S., Falcone, Y., Jéron, T., Marchand, H., Rollet, A. and Nguena-Timo, O.L. (2012). Runtime enforcement of timed properties. In: Qadeer, S. and Tasiran, S. (eds.) Runtime Verification, 3rd International Conference, RV 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7687, Istanbul, Turkey: Springer, 229244.Google Scholar
Ramadge, P.J. and Wonham, W.M. (1987). Supervisory control of a class of discrete event processes. SIAM Journal on Control and Optimization 25 (1) 206230.CrossRefGoogle Scholar
Ramadge, P.J. and Wonham, W.M. (1989). The control of discrete event systems. Proceedings of the IEEE 77 (1) 8198.CrossRefGoogle Scholar
Renard, M., Falcone, Y., Rollet, A., Pinisetty, S., Jéron, T. and Marchand, H. (2015). Enforcement of (timed) properties with uncontrollable events. In: Leucker, M., Rueda, C. and Valencia, F.D. (eds.) Theoretical Aspects of Computing - ICTAC 2015, Lecture Notes in Computer Science, vol. 9399, Springer International Publishing, 542560.CrossRefGoogle Scholar
Sammapun, U., Lee, I. and Sokolsky, O. (2005). RT-MaC: Runtime monitoring and checking of quantitative and probabilistic properties. In: Proceedings of the IEEE 19th International Conference on Embedded and Real-Time Computing Systems and Applications, 0:147–153.Google Scholar
Schneider, F.B. (2000). Enforceable security policies. ACM Transactions on Information and System Security 3 (1) 3050.CrossRefGoogle Scholar
10
Cited by

Save article to Kindle

To save this article to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Optimal enforcement of (timed) properties with uncontrollable events
Available formats
×

Save article to Dropbox

To save this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Dropbox account. Find out more about saving content to Dropbox.

Optimal enforcement of (timed) properties with uncontrollable events
Available formats
×

Save article to Google Drive

To save this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Google Drive account. Find out more about saving content to Google Drive.

Optimal enforcement of (timed) properties with uncontrollable events
Available formats
×
×

Reply to: Submit a response

Please enter your response.

Your details

Please enter a valid email address.

Conflicting interests

Do you have any conflicting interests? *