Skip to main content
×
×
Home

Optimal enforcement of (timed) properties with uncontrollable events

  • MATTHIEU RENARD (a1), YLIÈS FALCONE (a2), ANTOINE ROLLET (a1), THIERRY JÉRON (a3) and HERVÉ MARCHAND (a3)...
Abstract

This paper deals with runtime enforcement of untimed and timed properties with uncontrollable events. Runtime enforcement consists in defining and using mechanisms that modify the executions of a running system to ensure their correctness with respect to a desired property. We introduce a framework that takes as input any regular (timed) property described by a deterministic automaton over an alphabet of events, with some of these events being uncontrollable. An uncontrollable event cannot be delayed nor intercepted by an enforcement mechanism. Enforcement mechanisms should satisfy important properties, namely soundness, compliance and optimality – meaning that enforcement mechanisms should output as soon as possible correct executions that are as close as possible to the input execution. We define the conditions for a property to be enforceable with uncontrollable events. Moreover, we synthesise sound, compliant and optimal descriptions of runtime enforcement mechanisms at two levels of abstraction to facilitate their design and implementation.

Copyright
References
Hide All
Alur, R. and Dill, D. (1992). The theory of timed automata. In: de Bakker, J., Huizing, C., de Roever, W. and Rozenberg, G. (eds.) Real-Time: Theory in Practice, Lecture Notes in Computer Science, vol. 600, Berlin Heidelberg: Springer, 4573.
Basin, D., Jugé, V., Klaedtke, F. and Zălinescu, E. (2013). Enforceable security policies revisited. ACM Transactions on Information and System Security. 16 (1) 3:13:26.
Basin, D., Klaedtke, F. and Zalinescu, E. (2011). Algorithms for monitoring real-time properties. In: Khurshid, S. and Sen, K. (eds.) Proceedings of the 2nd International Conference on Runtime Verification (RV 2011), Lecture Notes in Computer Science, vol. 7186, Springer-Verlag, 260275.
Bloem, R., Könighofer, B., Könighofer, R. and Wang, C. (2015). Shield synthesis: - Runtime enforcement for reactive systems. In: Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 533–548.
Charafeddine, H., El-Harake, K., Falcone, Y. and Jaber, M. (2015). Runtime enforcement for component-based systems. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015, 1789–1796.
Colombo, C., Pace, G. J. and Schneider, G. (2009a). LARVA –- safer monitoring of real-time Java programs (tool paper). In: Hung, D.V. and Krishnan, P. (eds.) Proceedings of the 7th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2009), IEEE Computer Society, 3337.
Colombo, C., Pace, G. J. and Schneider, G. (2009b). Safe runtime verification of real-time properties. In: Ouaknine, J. and Vaandrager, F.W. (eds.) Proceedings of the 7th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS 2009), Lecture Notes in Computer Science, vol. 5813, Springer, 103117.
Dolzhenko, E., Ligatti, J. and Reddy, S. (2015). Modeling runtime enforcement with mandatory results automata. International Journal of Information Security 14 (1) 4760.
Falcone, Y., Havelund, K. and Reger, G. (2013). A tutorial on runtime verification. In: Broy, M., Peled, D.A. and Kalus, G. (eds.) Engineering Dependable Software Systems, NATO Science for Peace and Security Series, D: Information and Communication Security, vol. 34, IOS Press, 141175.
Falcone, Y., Mounier, L., Fernandez, J. and Richier, J. (2011). Runtime enforcement monitors: Composition, synthesis, and enforcement abilities. Formal Methods in System Design 38 (3) 223262.
Leucker, M. and Schallhart, C. (2009). A brief account of runtime verification. Journal of Logic Programming 78 (5) 293303.
Ligatti, J., Bauer, L. and Walker, D. (2009). Run-time enforcement of nonsafety policies. ACM Transactions on Information and System Security 12 (3) 19:119:41.
Pinisetty, S., Falcone, Y., Jéron, T. and Marchand, H. (2014a). Runtime enforcement of regular timed properties. In: Cho, Y., Shin, S.Y., Kim, S., Hung, C. and Hong, J. (eds.) Symposium on Applied Computing, SAC, Gyeongju, Republic of Korea: ACM, 12791286.
Pinisetty, S., Falcone, Y., Jéron, T. and Marchand, H. (2014b). Runtime enforcement of parametric timed properties with practical applications. In: Lesage, J., Faure, J., Cury, J.E.R. and Lennartson, B. (eds.) Proceedings of the 12th International Workshop on Discrete Event Systems, WODES, Cachan, France: International Federation of Automatic Control, 420427.
Pinisetty, S., Falcone, Y., Jéron, T., Marchand, H., Rollet, A. and Nguena-Timo, O. (2014c). Runtime enforcement of timed properties revisited. Formal Methods in System Design 45 (3) 381422.
Pinisetty, S., Falcone, Y., Jéron, T., Marchand, H., Rollet, A. and Nguena-Timo, O.L. (2012). Runtime enforcement of timed properties. In: Qadeer, S. and Tasiran, S. (eds.) Runtime Verification, 3rd International Conference, RV 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7687, Istanbul, Turkey: Springer, 229244.
Ramadge, P.J. and Wonham, W.M. (1987). Supervisory control of a class of discrete event processes. SIAM Journal on Control and Optimization 25 (1) 206230.
Ramadge, P.J. and Wonham, W.M. (1989). The control of discrete event systems. Proceedings of the IEEE 77 (1) 8198.
Renard, M., Falcone, Y., Rollet, A., Pinisetty, S., Jéron, T. and Marchand, H. (2015). Enforcement of (timed) properties with uncontrollable events. In: Leucker, M., Rueda, C. and Valencia, F.D. (eds.) Theoretical Aspects of Computing - ICTAC 2015, Lecture Notes in Computer Science, vol. 9399, Springer International Publishing, 542560.
Sammapun, U., Lee, I. and Sokolsky, O. (2005). RT-MaC: Runtime monitoring and checking of quantitative and probabilistic properties. In: Proceedings of the IEEE 19th International Conference on Embedded and Real-Time Computing Systems and Applications, 0:147–153.
Schneider, F.B. (2000). Enforceable security policies. ACM Transactions on Information and System Security 3 (1) 3050.
Recommend this journal

Email your librarian or administrator to recommend adding this journal to your organisation's collection.

Mathematical Structures in Computer Science
  • ISSN: 0960-1295
  • EISSN: 1469-8072
  • URL: /core/journals/mathematical-structures-in-computer-science
Please enter your name
Please enter a valid email address
Who would you like to send this to? *
×

Metrics

Full text views

Total number of HTML views: 0
Total number of PDF views: 15 *
Loading metrics...

Abstract views

Total abstract views: 132 *
Loading metrics...

* Views captured on Cambridge Core between 29th May 2017 - 23rd May 2018. This data will be updated every 24 hours.