Feb 122018
 

We are happy to announce our Springer LNCS tutorial book, Lectures on Runtime Verification – introductory and advanced topics, co-edited by Ezio Bartocci and myself.

The book is available on Springer Website.

The book contains introductory and advanced lectures on Runtime Verification authored by members of the COST Action IC 1402, ArVi, Runtime Verification beyond Monitoring.

The book contains the following chapters:

  • Introduction to Runtime Verification.
    Ezio Bartocci, Yliès Falcone, Adrian Francalanza, Giles Reger
  • Discovering Concurrency Errors.
    João M. Lourenço, Jan Fiedor, Bohuslav Krena, Tomas Vojnar
  • Monitoring Events that Carry Data.
    Klaus Havelund, Giles Reger, Daniel Thoma, Eugen Zalinescu
  • Runtime Failure Prevention and Reaction.
    Yliès Falcone, Leonardo Mariani, Antoine Rollet, Saikat Saha
  • Specification-Based Monitoring of Cyber-Physical Systems: A Survey on Theory, Tools and Applications.
    Ezio Bartocci, Jyotirmoy Deshmukh, Alexandre Donzé, Georgios Fainekos, Oded Maler, Dejan Nickovic, Sriram Sankaranarayanan.
  • Runtime Verification for Decentralised and Distributed Systems.
    Adrian Francalanza, Jorge A. Pérez, César Sánchez
  • Industrial Experiences with Runtime Verification of Financial Transaction Systems: Lessons Learnt and Standing Challenges.
    Christian Colombo, Gordon J. Pace

Dec 112017
 

Today I’m at the defence of Matthieu Renard Ph.D. thesis in Bordeaux, France.

Matthieu’s thesis is entitled Runtime Enforcement of (Timed) Properties with Uncontrollable Events. 

This thesis studies the runtime enforcement of timed properties when some events are uncontrollable. This work falls in the domain of runtime verification, which includes all the techniques and tools based on or related to the monitoring of system executions with respect to requirement properties. These properties can be specified using different models such as logic formulae or automata. We consider timed regular properties, that can be represented by timed automata. As for runtime verification, a runtime enforcement mechanism watches the executions of a system, but instead of just outputting a verdict, it modifies the execution so that it satisfies the property. We are interested in runtime enforcement with uncontrollable events. An uncontrollable event is an event that an enforcement mechanism can not modify. We describe the synthesis of enforcement mechanisms, in both a functional and an operational way, that enforce some desired timed regular property. We define two equivalent enforcement mechanisms, the first one being simple, without considering complexity aspects, whereas the second one has a better time complexity thanks to the use of game theory; the latter being better suited for implementation. We also detail a tool that implements the second enforcement mechanism, as well as some performance considerations. The overhead introduced by the use of our tool seems low enough to be used in some real-time application scenarios.

Dec 072017
 

Today, I’m at the MTV2 day of the French working group on software engineering. The MTV2 day deals with testing methods for verification and validation of software systems.

I’ll present our recent work on Monitoring Decentralised Specifications, which I have also recently presented at ISSTA 2017.

The presented slides can be downloaded by following this link.

The program of the day is available by following this link.

Nov 232017
 

I am at Konstantin Selyunin’s Ph.D. defense in Vienna, Austria.

Konstantin’s thesis is entitled Neural Models For Monitoring and Control with Applications in Automotive Domain.

The abstract of his thesis is below:

Cyber-physical systems (CPS), which incorporate physical as well as computational components, are a grand challenge of academia and industry in terms of their development, verification, and maintenance. In order for CPS to serve their purpose and ultimately make human lives safer, easier, more enjoyable, and convenient, both academia and industry needs to develop new methods for control and monitoring of such systems. Neural models are a very promising and far looking direction for the design of CPS controllers and monitors. In this thesis we first show how neural models can be applied in CPS control to quantify the uncertainty of the system. We then present how digital spiking neural model, called TrueNorth, can be used in the runtime monitoring of temporal-logic specifications for mission-critical systems. In order to be able to deliver not only a qualitative verdict, but also to reason in a quantitative way, we propose an approach for modeling arithmetic-functions with spiking neurones, and implement neural monitors for (signal) temporal logic specifications based on circular convolution.

In the applied part of the thesis we demonstrate how runtime monitoring can speed up the verification and validation phases in automotive electronic development. We identify phases where runtime monitoring can facilitate both pre- and post-silicon verification and testing. To build runtime monitors that are capable of keeping up with the speed of the physical sensors, we developed an approach to convert formalized requirements to hardware monitors, which are then synthesized in an FPGA. The results of this work enable long-term requirements evaluation and foster reuse of the monitors from pre- to post-silicon verification phases using high-level synthesis. We illustrate our approach by formalizing, creating hardware monitors, and evaluating the results in the lab environment for electrical and timing requirements of the industrial SENT and SPC protocols.

Oct 252017
 

I’m at ISSRE 2017 in Toulouse, France, for the presentation of our paper on Interactive Runtime Verification and attending the talks of the day.

Our paper on Interactive Runtime Verification (i-RV) can be downloaded here.

Verde, our open-source tool for i-RV, can be retrieved and experimented with our interactive tutorial by following this link. Our interactive tutorial illustrates how i-RV can be used to more effectively debug C programs leveraging runtime verification.

Aug 102017
 

Our journal paper entitled Decentralized Enforcement of Document Lifecycle Constraints has been accepted for publication in Information Systems, an Elsevier journal.

Below is an abstract of the paper:

Artifact-centric workflows describe possible executions of a business process through constraints expressed from the point of view of the documents exchanged between principals. A sequence of manipulations is deemed valid as long as every document in the workflow follows its prescribed lifecycle at all steps of the process. So far, establishing that a given workflow complies with artifact lifecycles has mostly been done through static verification, or by assuming a centralized access to all artifacts where these constraints can be monitored and enforced. We present in this paper an alternate method of enforcing document lifecycles that requires neither static verification nor single-point access. Rather, the document itself is designed to carry fragments of its history, protected from tampering using hashing and public-key encryption. Any principal involved in the process can verify at any time that the history of a document complies with a given lifecycle. Moreover, the proposed system also enforces access permissions: not all actions are visible to all principals, and one can only modify and verify what one is allowed to observe. These concepts have been implemented in a software library called Artichoke, and empirically tested for performance and scalability.

This is joint work with Sylvain Hallé, Raphaël Khoury, Quentin Betty from Université du Quebec at Chicoutimi, and Antoine El-Hokayem from Univ. Grenoble Alpes.

Jul 232017
 

CALL FOR PAPERS

***************
Topic E3: Model-based Design and Verification for Embedded Systems
*********************************************************

at DATE 2018,
Dresden, GE
March 19 – 23, 2018
https://www.date-conference.com/call-for-papers#The-Conference
https://www.date-conference.com/group/tpc/members/2018/E3

DATE 2018, will take place from 19 to 23 March, 2018, at the International Congress Center in Dresden, Germany.

The conference addresses all aspects of research into technologies for electronic and embedded systems engineering. An important part of the conference  is devoted to modeling, analysis, design and deployment of embedded software.

We invite you to submit papers to Topic E3: Model-based Design and Verification for Embedded Systems.

Main topics of interest:

Verification techniques for embedded and cyber-physical systems ranging from simulation, testing, model-checking, SAT and SMT-based reasoning, compositional analysis and analytical methods. Modeling, analysis and optimization of non-functional and performance aspects such as timing, memory usage, QoS and reliability. Model-based design of software architectures and deployment. Theories, languages and tools supporting model-based design flows covering software, control and physical components. Monitoring and run-time verification of embedded systems.

Topic Chair: Petru Eles, Linköping University, SE
Topic Co-Chair: Borzoo Bonakdarpour, University of Waterloo, CA,

Topic Subcommittee Members:

  • Sudipta Chattopadhyay, Singapore University of Technology and Design (SUTD), SG
  • Ylies Falcone, University Grenoble Alpes, FR
  • Florence Maraninchi, Verimag, FR
  • Kristin Rozier, Iowa State University, US
  • Lothar Thiele, ETH Zurich, CH

Please note:

Jul 172017
 

The paper entitled GREP: Games for the Runtime Enforcement of Properties has been accepted for publication in the proceedings of ICTSS 2017, the 29th IFIP International Conference on Testing Software and Systems.

Below is an abstract of the paper:

We present GREP, a tool for the runtime enforcement of (timed) properties. GREP takes an execution sequence as input (stdin), and modifies it (stdout) as necessary to enforce the desired property, when possible. GREP can enforce any regular timed property described by a deterministic and complete Timed Automaton. The main novelties of GREP are twofold: it uses game theory to improve the synthesis of enforcement mechanisms, and it accounts for uncontrollable events, i.e. events that cannot be controlled by the enforcement mechanisms and thus have to be released immediately. We present an overview of GREP and validate its usability with a performance evaluation.

This is joint work with Matthieu Renard and Antoine Rollet from University of Bordeaux.

The pre-print of the paper can be downloaded here.