An overview of the MOP runtime verification framework

PON Meredith, D Jin, D Griffith, F Chen… - International Journal on …, 2012 - Springer
This article gives an overview of the, monitoring oriented programming framework (MOP). In
MOP, runtime monitoring is supported and encouraged as a fundamental principle for …

A survey of challenges for runtime verification from advanced application domains (beyond software)

C Sánchez, G Schneider, W Ahrendt, E Bartocci… - Formal Methods in …, 2019 - Springer
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …

Data-centered runtime verification of wireless medical cyber-physical system

Y Jiang, H Song, R Wang, M Gu… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Wireless medical cyber-physical systems are widely adopted in the daily practices of
medicine, where huge amounts of data are sampled by the wireless medical devices and …

Copilot: A hard real-time runtime monitor

L Pike, A Goodloe, R Morisset, S Niller - International Conference on …, 2010 - Springer
We address the problem of runtime monitoring for hard real-time programs—a domain in
which correctness is critical yet has largely been overlooked in the runtime monitoring …

Vigilare: toward snoop-based kernel integrity monitor

H Moon, H Lee, J Lee, K Kim, Y Paek… - Proceedings of the 2012 …, 2012 - dl.acm.org
In this paper, we present Vigilare system, a kernel integrity monitor that is architected to
snoop the bus traffic of the host system from a separate independent hardware. This snoop …

R2U2: monitoring and diagnosis of security threats for unmanned aerial systems

P Moosbrugger, KY Rozier, J Schumann - Formal Methods in System …, 2017 - Springer
We present R2U2, a novel framework for runtime monitoring of security properties and
diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2 …

R2U2: monitoring and diagnosis of security threats for unmanned aerial systems

J Schumann, P Moosbrugger, KY Rozier - Runtime Verification: 6th …, 2015 - Springer
We present R2U2, a novel framework for runtime monitoring of security properties and
diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2 …

What is a trace? A runtime verification perspective

G Reger, K Havelund - … Symposium on Leveraging Applications of Formal …, 2016 - Springer
Abstract Runtime Monitoring or Verification deals with traces. In its most simple form a
monitoring system takes a trace produced by a system and a specification of correct …

A case study on runtime monitoring of an autonomous research vehicle (ARV) system

A Kane, O Chowdhury, A Datta, P Koopman - Runtime Verification: 6th …, 2015 - Springer
Runtime monitoring is a versatile technique for detecting property violations in safety-critical
(SC) systems. Although instrumentation of the system under monitoring is a common …

Robustness testing of autonomy software

C Hutchison, M Zizyte, PE Lanigan… - Proceedings of the 40th …, 2018 - dl.acm.org
As robotic and autonomy systems become progressively more present in industrial and
human-interactive applications, it is increasingly critical for them to behave safely in the …