An overview of the MOP runtime verification framework
PON Meredith, D Jin, D Griffith, F Chen… - International Journal on …, 2012 - Springer
This article gives an overview of the, monitoring oriented programming framework (MOP). In
MOP, runtime monitoring is supported and encouraged as a fundamental principle for …
MOP, runtime monitoring is supported and encouraged as a fundamental principle for …
A survey of challenges for runtime verification from advanced application domains (beyond software)
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …
execution traces against formal specifications. Typically, the two main activities in runtime …
Data-centered runtime verification of wireless medical cyber-physical system
Wireless medical cyber-physical systems are widely adopted in the daily practices of
medicine, where huge amounts of data are sampled by the wireless medical devices and …
medicine, where huge amounts of data are sampled by the wireless medical devices and …
Copilot: A hard real-time runtime monitor
We address the problem of runtime monitoring for hard real-time programs—a domain in
which correctness is critical yet has largely been overlooked in the runtime monitoring …
which correctness is critical yet has largely been overlooked in the runtime monitoring …
Vigilare: toward snoop-based kernel integrity monitor
In this paper, we present Vigilare system, a kernel integrity monitor that is architected to
snoop the bus traffic of the host system from a separate independent hardware. This snoop …
snoop the bus traffic of the host system from a separate independent hardware. This snoop …
R2U2: monitoring and diagnosis of security threats for unmanned aerial systems
P Moosbrugger, KY Rozier, J Schumann - Formal Methods in System …, 2017 - Springer
We present R2U2, a novel framework for runtime monitoring of security properties and
diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2 …
diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2 …
R2U2: monitoring and diagnosis of security threats for unmanned aerial systems
J Schumann, P Moosbrugger, KY Rozier - Runtime Verification: 6th …, 2015 - Springer
We present R2U2, a novel framework for runtime monitoring of security properties and
diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2 …
diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2 …
What is a trace? A runtime verification perspective
G Reger, K Havelund - … Symposium on Leveraging Applications of Formal …, 2016 - Springer
Abstract Runtime Monitoring or Verification deals with traces. In its most simple form a
monitoring system takes a trace produced by a system and a specification of correct …
monitoring system takes a trace produced by a system and a specification of correct …
A case study on runtime monitoring of an autonomous research vehicle (ARV) system
Runtime monitoring is a versatile technique for detecting property violations in safety-critical
(SC) systems. Although instrumentation of the system under monitoring is a common …
(SC) systems. Although instrumentation of the system under monitoring is a common …
Robustness testing of autonomy software
C Hutchison, M Zizyte, PE Lanigan… - Proceedings of the 40th …, 2018 - dl.acm.org
As robotic and autonomy systems become progressively more present in industrial and
human-interactive applications, it is increasingly critical for them to behave safely in the …
human-interactive applications, it is increasingly critical for them to behave safely in the …