Automated translation of natural language requirements to runtime monitors
Runtime verification (RV) enables monitoring systems at runtime, to detect property
violations early and limit their potential consequences. This paper presents an end-to-end …
violations early and limit their potential consequences. This paper presents an end-to-end …
[HTML][HTML] Software doping analysis for human oversight
This article introduces a framework that is meant to assist in mitigating societal risks that
software can pose. Concretely, this encompasses facets of software doping as well as …
software can pose. Concretely, this encompasses facets of software doping as well as …
[HTML][HTML] On the road with RTLola: Testing real driving emissions on your phone
This paper is about shipping runtime verification to the masses. It presents the crucial
technology enabling everyday car owners to monitor the behaviour of their cars in-the-wild …
technology enabling everyday car owners to monitor the behaviour of their cars in-the-wild …
Symbolic runtime verification for monitoring under uncertainties and assumptions
H Kallwies, M Leucker, C Sánchez - International Symposium on …, 2022 - Springer
Runtime Verification deals with the question of whether a run of a system adheres to its
specification. This paper studies runtime verification in the presence of partial knowledge …
specification. This paper studies runtime verification in the presence of partial knowledge …
[HTML][HTML] Real-time visualization of stream-based monitoring data
Stream-based runtime monitors are used in safety-critical applications such as Unmanned
Aerial Systems (UAS) to compute comprehensive statistics and logical assessments of …
Aerial Systems (UAS) to compute comprehensive statistics and logical assessments of …
[PDF][PDF] On the detection of doped software by falsification
S Biewer, H Hermanns - International Conference on …, 2022 - library.oapen.org
Software doping is a phenomenon that refers to the presence of hidden software
functionality, whose existence is only in the interest of the manufacturer. The most prominent …
functionality, whose existence is only in the interest of the manufacturer. The most prominent …
Software doping–Theory and detection
S Biewer - 2023 - publikationen.sulb.uni-saarland.de
Software is doped if it contains a hidden functionality that is intentionally included by the
manufacturer and is not in the interest of the user or society. This thesis complements this …
manufacturer and is not in the interest of the user or society. This thesis complements this …
Configurable-by-construction runtime monitoring
C Dubslaff, MA Köhl - … Symposium on Leveraging Applications of Formal …, 2022 - Springer
Most modern systems, be it cyber-physical or mere software systems, are highly
configurable. The main challenge when dealing with such configurable systems stems from …
configurable. The main challenge when dealing with such configurable systems stems from …
Integrating FRET with Copilot: Automated Translation of Natural Language Requirements to Runtime Monitors
Runtime verification (RV) enables monitoring systems at runtime, to detect property
violations early and limit their potential consequences. To provide the level of assurance …
violations early and limit their potential consequences. To provide the level of assurance …
Consequences of Enterprise Social Media Network Positions for Employees
S Sebastian, L Sven, S Heidi - 2023 - dlib.phenikaa-uni.edu.vn
Employees often use enterprise social media (ESM) for communication, collaboration, and
knowledge sharing, leading to ESM networks–that is, social networks of interrelated …
knowledge sharing, leading to ESM networks–that is, social networks of interrelated …