-
1
-
-
84885619076
-
Verify your runs
-
Meyer, B., Woodcock, J. (eds.) VSTTE 2005. Springer, Heidelberg
-
Havelund, K., Goldberg, A.: Verify your runs. In: Meyer, B., Woodcock, J. (eds.) VSTTE 2005. LNCS, vol. 4171, pp. 374-383. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4171
, pp. 374-383
-
-
Havelund, K.1
Goldberg, A.2
-
5
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Programming Lang. and Syst. 28, 175-205 (2006)
-
(2006)
ACM Trans. Programming Lang. and Syst.
, vol.28
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
6
-
-
70549102701
-
Enforcement monitoring wrt. the safety-progress classification of properties
-
Falcone, Y., Fernandez, J.C., Mounier, L.: Enforcement monitoring wrt. the safety-progress classification of properties. In: SAC 2009: Proceedings of the ACM symposium on Applied Computing, pp. 593-600 (2009)
-
(2009)
SAC 2009: Proceedings of the ACM Symposium on Applied Computing
, pp. 593-600
-
-
Falcone, Y.1
Fernandez, J.C.2
Mounier, L.3
-
7
-
-
69949167255
-
Security monitor inlining for multithreaded Java
-
Drossopoulou, S. (ed.) ECOOP 2009 - Object-Oriented Programming. Springer, Heidelberg
-
Dam, M., Jacobs, B., Lundblad, A., Piessens, F.: Security monitor inlining for multithreaded Java. In: Drossopoulou, S. (ed.) ECOOP 2009 - Object-Oriented Programming. LNCS, vol. 5653, pp. 546-569. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5653
, pp. 546-569
-
-
Dam, M.1
Jacobs, B.2
Lundblad, A.3
Piessens, F.4
-
8
-
-
47249101556
-
Provably correct runtime monitoring
-
Cuellar, J., Maibaum, T., Sere, K. (eds.) FM 2008. Springer, Heidelberg
-
Aktug, I., Dam, M., Gurov, D.: Provably correct runtime monitoring. In: Cuellar, J., Maibaum, T., Sere, K. (eds.) FM 2008. LNCS, vol. 5014, pp. 262-277. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5014
, pp. 262-277
-
-
Aktug, I.1
Dam, M.2
Gurov, D.3
-
10
-
-
62849120146
-
Rewrite based specification of access control policies
-
Cirstea, H., Moreau, P.E., de Oliveira, A.S.: Rewrite based specification of access control policies. Electron. Notes Theor. Comput. Sci. 234, 37-54 (2009)
-
(2009)
Electron. Notes Theor. Comput. Sci.
, vol.234
, pp. 37-54
-
-
Cirstea, H.1
Moreau, P.E.2
De Oliveira, A.S.3
-
11
-
-
62849128528
-
Weaving rewrite-based access control policies
-
de Oliveira, A.S., Wang, E.K., Kirchner, C., Kirchner, H.: Weaving rewrite-based access control policies. In: FMSE 2007: Proceedings of the ACM workshop on Formal Methods in Security Engineering, pp. 71-80 (2007)
-
(2007)
FMSE 2007: Proceedings of the ACM Workshop on Formal Methods in Security Engineering
, pp. 71-80
-
-
De Oliveira, A.S.1
Wang, E.K.2
Kirchner, C.3
Kirchner, H.4
-
12
-
-
11144354549
-
An overview of the runtime verification tool Java PathExplorer
-
Havelund, K., Rosu, G.: An overview of the runtime verification tool Java PathExplorer. Formal Methods in System Design 24 (2003)
-
(2003)
Formal Methods in System Design
, pp. 24
-
-
Havelund, K.1
Rosu, G.2
-
13
-
-
80051962462
-
Runtime verification of C programs
-
Suzuki, K., Higashino, T., Ulrich, A., Hasegawa, T. (eds.) TestCom/FATES 2008. Springer, Heidelberg
-
Havelund, K.: Runtime verification of C programs. In: Suzuki, K., Higashino, T., Ulrich, A., Hasegawa, T. (eds.) TestCom/FATES 2008. LNCS, vol. 5047, pp. 7-22. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5047
, pp. 7-22
-
-
Havelund, K.1
-
14
-
-
84947290593
-
The Temporal Rover and the ATG rover
-
Havelund, K., Penix, J., Visser,W. (eds.) SPIN 2000. Springer, Heidelberg
-
Drusinsky, D.: The Temporal Rover and the ATG rover. In: Havelund, K., Penix, J., Visser,W. (eds.) SPIN 2000. LNCS, vol. 1885, pp. 323-330. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1885
, pp. 323-330
-
-
Drusinsky, D.1
-
15
-
-
42149109631
-
MOP: An Efficient and Generic Runtime Verification Framework
-
Chen, F., Roşu, G.: MOP: An Efficient and Generic Runtime Verification Framework. In: OOPSLA 2007: Object-Oriented Programming, Systems, Languages and Applications, pp. 569-588 (2007)
-
(2007)
OOPSLA 2007: Object-Oriented Programming, Systems, Languages and Applications
, pp. 569-588
-
-
Chen, F.1
Roşu, G.2
-
16
-
-
70350637810
-
Parametric trace slicing and monitoring
-
Kowalewski, S., Philippou, A. (eds.) TACAS 2009. Springer, Heidelberg
-
Chen, F., Rosu, G.: Parametric trace slicing and monitoring. In: Kowalewski, S., Philippou, A. (eds.) TACAS 2009. LNCS, vol. 5505, pp. 246-261. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5505
, pp. 246-261
-
-
Chen, F.1
Rosu, G.2
-
18
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
Lamport, L.: Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering 3, 125-143 (1977)
-
(1977)
IEEE Transactions on Software Engineering
, vol.3
, pp. 125-143
-
-
Lamport, L.1
-
20
-
-
0021603475
-
Adequate proof principles for invariance and liveness properties of concurrent programs
-
Manna, Z., Pnueli, A.: Adequate proof principles for invariance and liveness properties of concurrent programs. Sci. Comput. Program. 4, 257-289 (1984)
-
(1984)
Sci. Comput. Program.
, vol.4
, pp. 257-289
-
-
Manna, Z.1
Pnueli, A.2
-
24
-
-
85029784740
-
Characterization of temporal property classes
-
Kuich,W. (ed.) ICALP 1992. Springer, Heidelberg
-
Chang, E.Y., Manna, Z., Pnueli, A.: Characterization of temporal property classes. In: Kuich,W. (ed.) ICALP 1992. LNCS, vol. 623, pp. 474-486. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.623
, pp. 474-486
-
-
Chang, E.Y.1
Manna, Z.2
Pnueli, A.3
-
25
-
-
2342544079
-
-
Technical report, Stanford University, Dept. of Computer Science
-
Chang, E., Manna, Z., Pnueli, A.: The Safety-Progress Classification. Technical report, Stanford University, Dept. of Computer Science (1992)
-
(1992)
The Safety-Progress Classification
-
-
Chang, E.1
Manna, Z.2
Pnueli, A.3
-
27
-
-
85027914346
-
What can you verify and enforce at runtime?
-
Invited Paper, under review. Preprint as Verimag TR-2010-5
-
Falcone, Y., Fernandez, J.C., Mounier, L.: What can you verify and enforce at runtime? Software Tools for Technology Transfer, special issue on Runtime Verification (2010), Invited Paper, under review. Preprint as Verimag TR-2010-5
-
(2010)
Software Tools for Technology Transfer, Special Issue on Runtime Verification
-
-
Falcone, Y.1
Fernandez, J.C.2
Mounier, L.3
-
28
-
-
78650100856
-
-
Runtime Verification (2001-2009), http://www.runtime-verification.org
-
(2001)
-
-
-
29
-
-
36649025165
-
Run-time verification
-
Broy, M., Jonsson, B., Katoen, J.-P., Leucker, M., Pretschner, A. (eds.) Model-Based Testing of Reactive Systems. Springer, Heidelberg
-
Colin, S., Mariani, L.: Run-time verification. In: Broy, M., Jonsson, B., Katoen, J.-P., Leucker, M., Pretschner, A. (eds.) Model-Based Testing of Reactive Systems. LNCS, vol. 3472, pp. 525-556. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3472
, pp. 525-556
-
-
Colin, S.1
Mariani, L.2
-
30
-
-
57349161233
-
jPredictor: A predictive runtime analysis tool for Java
-
Chen, F., Şerbǎnuţǎ, T.F., Roşu, G.: jPredictor: a predictive runtime analysis tool for Java. In: ICSE 2008: Proceedings of the 30th International Conference on Software Engineering, pp. 221-230 (2008)
-
(2008)
ICSE 2008: Proceedings of the 30th International Conference on Software Engineering
, pp. 221-230
-
-
Chen, F.1
Şerbǎnuţǎ, T.F.2
Roşu, G.3
-
32
-
-
33745527783
-
Dynamic deadlock analysis of multi-threaded programs
-
Ur, S., Bin, E., Wolfsthal, Y. (eds.) HVC 2005. Springer, Heidelberg
-
Bensalem, S., Havelund, K.: Dynamic deadlock analysis of multi-threaded programs. In: Ur, S., Bin, E., Wolfsthal, Y. (eds.) HVC 2005. LNCS, vol. 3875, pp. 208-223. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3875
, pp. 208-223
-
-
Bensalem, S.1
Havelund, K.2
-
34
-
-
67650694003
-
Do you really mean what you actually enforced?
-
Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. Springer, Heidelberg
-
Bielova, N., Massacci, F.: Do you really mean what you actually enforced? In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 287-301. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5491
, pp. 287-301
-
-
Bielova, N.1
Massacci, F.2
-
35
-
-
35248828504
-
Aspect-oriented programming
-
Aksit, M., Matsuoka, S. (eds.) ECOOP 1997. Springer, Heidelberg
-
Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C.V., Loingtier, J.M., Irwin, J.: Aspect-oriented programming. In: Aksit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220-242. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1241
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.V.5
Loingtier, J.M.6
Irwin, J.7
-
37
-
-
23844512564
-
A taxonomy and catalog of runtime software-fault monitoring tools
-
Delgado, N., Gates, A.Q., Roach, S.: A taxonomy and catalog of runtime software-fault monitoring tools. IEEE Trans. on Software Engineering 30, 859-872 (2004)
-
(2004)
IEEE Trans. on Software Engineering
, vol.30
, pp. 859-872
-
-
Delgado, N.1
Gates, A.Q.2
Roach, S.3
-
38
-
-
24644444646
-
Foundations for the run-time monitoring of reactive systems - Fundamentals of the MaC language
-
Liu, Z., Araki, K. (eds.) ICTAC 2004. Springer, Heidelberg
-
Viswanathan, M., Kim, M.: Foundations for the run-time monitoring of reactive systems - fundamentals of the MaC language. In: Liu, Z., Araki, K. (eds.) ICTAC 2004. LNCS, vol. 3407, pp. 543-556. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3407
, pp. 543-556
-
-
Viswanathan, M.1
Kim, M.2
-
39
-
-
33749421226
-
PSL model checking and run-time verification via testers
-
Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. Springer, Heidelberg
-
Pnueli, A., Zaks, A.: PSL model checking and run-time verification via testers. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol. 4085, pp. 573-586. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4085
, pp. 573-586
-
-
Pnueli, A.1
Zaks, A.2
-
41
-
-
70549106238
-
Runtime verification of safety-progress properties
-
Bensalem, S., Peled, D. (eds.) RV 2009. Springer, Heidelberg
-
Falcone, Y., Fernandez, J.-C., Mounier, L.: Runtime verification of safety-progress properties. In: Bensalem, S., Peled, D. (eds.) RV 2009. LNCS, vol. 5779, pp. 40-59. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5779
, pp. 40-59
-
-
Falcone, Y.1
Fernandez, J.-C.2
Mounier, L.3
-
42
-
-
56749083145
-
-
Technical Report TUM-I0724, Technische Universität München
-
Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. Technical Report TUM-I0724, Technische Universität München (2007)
-
(2007)
Runtime Verification for LTL and TLTL
-
-
Bauer, A.1
Leucker, M.2
Schallhart, C.3
-
43
-
-
26444539487
-
Efficient monitoring of ω-languages
-
Etessami, K., Rajamani, S.K. (eds.) CAV 2005. Springer, Heidelberg
-
d'Amorim, M., Roşu, G.: Efficient monitoring of ω-languages. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 364-378. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3576
, pp. 364-378
-
-
D'Amorim, M.1
Roşu, G.2
-
44
-
-
38549176106
-
Rule systems for run-time monitoring: From Eagle to RuleR
-
Sokolsky, O., Taşiran, S. (eds.) RV 2007. Springer, Heidelberg
-
Barringer, H., Rydeheard, D.E., Havelund, K.: Rule systems for run-time monitoring: From Eagle to RuleR. In: Sokolsky, O., Taşiran, S. (eds.) RV 2007. LNCS, vol. 4839, pp. 111-125. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4839
, pp. 111-125
-
-
Barringer, H.1
Rydeheard, D.E.2
Havelund, K.3
-
46
-
-
78650165118
-
-
under revision at Formal Methods in System Design. Preprint as Verimag TR 2008-7
-
Falcone, Y., Mounier, L., Fernandez, J.C., Richier, J.L.: Runtime enforcement monitors: composition, synthesis, and enforcement abilities (2010), under revision at Formal Methods in System Design. Preprint as Verimag TR 2008-7
-
(2010)
Runtime Enforcement Monitors: Composition, Synthesis, and Enforcement Abilities
-
-
Falcone, Y.1
Mounier, L.2
Fernandez, J.C.3
Richier, J.L.4
-
47
-
-
33646066871
-
Enforcing non-safety security policies with program monitors
-
di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
-
Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 355-373. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3679
, pp. 355-373
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
48
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. Int. Journal of Information Security 4, 2-16 (2005)
-
(2005)
Int. Journal of Information Security
, vol.4
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
50
-
-
85133871088
-
Execution monitoring enforcement for limitedmemory systems
-
Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement for limitedmemory systems. In: PST 2006: Proceedings of the International Conference on Privacy, Security and Trust, pp. 1-12 (2006)
-
(2006)
PST 2006: Proceedings of the International Conference on Privacy, Security and Trust
, pp. 1-12
-
-
Talhi, C.1
Tawbi, N.2
Debbabi, M.3
-
51
-
-
0008574347
-
-
PhD thesis, University of Pennsylvania, Philadelphia, PA, USA
-
Viswanathan, M.: Foundations for the run-time analysis of software systems. PhD thesis, University of Pennsylvania, Philadelphia, PA, USA (2000)
-
(2000)
Foundations for the Run-time Analysis of Software Systems
-
-
Viswanathan, M.1
-
52
-
-
67649909566
-
Security policies enforcement using finite edit automata
-
Beauquier, D., Cohen, J., Lanotte, R.: Security policies enforcement using finite edit automata. Electr. Notes Theor. Comput. Sci. 229, 19-35 (2009)
-
(2009)
Electr. Notes Theor. Comput. Sci.
, vol.229
, pp. 19-35
-
-
Beauquier, D.1
Cohen, J.2
Lanotte, R.3
-
53
-
-
2942723443
-
-
Elsevier, Amsterdam
-
Perrin, D., Pin, J.E.: Infinite Words, Automata, Semigroups, Logic and Games. Elsevier, Amsterdam (2004)
-
(2004)
Infinite Words, Automata, Semigroups, Logic and Games
-
-
Perrin, D.1
Pin, J.E.2
-
55
-
-
34347249528
-
Automated synthesis of enforcing mechanisms for security properties in a timed setting
-
Matteucci, I.: Automated synthesis of enforcing mechanisms for security properties in a timed setting. Elec. Notes in Theoritical Comp. Science 186, 101-120 (2007)
-
(2007)
Elec. Notes in Theoritical Comp. Science
, vol.186
, pp. 101-120
-
-
Matteucci, I.1
-
56
-
-
58649088214
-
Synthesizing enforcement monitors wrt. the safety-progress classification of properties
-
Sekar, R., Pujari, A.K. (eds.) ICISS 2008. Springer, Heidelberg
-
Falcone, Y., Fernandez, J.C., Mounier, L.: Synthesizing enforcement monitors wrt. the safety-progress classification of properties. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 41-55. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5352
, pp. 41-55
-
-
Falcone, Y.1
Fernandez, J.C.2
Mounier, L.3
-
57
-
-
78650741234
-
Generating in-line monitors for Rabin automata
-
Chabot, H., Khoury, R., Tawbi, N.: Generating in-line monitors for Rabin automata. In: NordSec 2009: 14th Nordic Conf. on Secure IT Systems, pp. 287-301 (2009)
-
(2009)
NordSec 2009: 14th Nordic Conf. on Secure IT Systems
, pp. 287-301
-
-
Chabot, H.1
Khoury, R.2
Tawbi, N.3
|