Automated translation of natural language requirements to runtime monitors

I Perez, A Mavridou, T Pressburger, A Goodloe… - … Conference on Tools …, 2022 - Springer
Runtime verification (RV) enables monitoring systems at runtime, to detect property
violations early and limit their potential consequences. This paper presents an end-to-end …

[HTML][HTML] Software doping analysis for human oversight

S Biewer, K Baum, S Sterz, H Hermanns… - Formal Methods in …, 2024 - Springer
This article introduces a framework that is meant to assist in mitigating societal risks that
software can pose. Concretely, this encompasses facets of software doping as well as …

[HTML][HTML] On the road with RTLola: Testing real driving emissions on your phone

S Biewer, B Finkbeiner, H Hermanns, MA Köhl… - International Journal on …, 2023 - Springer
This paper is about shipping runtime verification to the masses. It presents the crucial
technology enabling everyday car owners to monitor the behaviour of their cars in-the-wild …

Symbolic runtime verification for monitoring under uncertainties and assumptions

H Kallwies, M Leucker, C Sánchez - International Symposium on …, 2022 - Springer
Runtime Verification deals with the question of whether a run of a system adheres to its
specification. This paper studies runtime verification in the presence of partial knowledge …

[HTML][HTML] Real-time visualization of stream-based monitoring data

J Baumeister, B Finkbeiner, S Gumhold… - … Conference on Runtime …, 2022 - Springer
Stream-based runtime monitors are used in safety-critical applications such as Unmanned
Aerial Systems (UAS) to compute comprehensive statistics and logical assessments of …

[PDF][PDF] On the detection of doped software by falsification

S Biewer, H Hermanns - International Conference on …, 2022 - library.oapen.org
Software doping is a phenomenon that refers to the presence of hidden software
functionality, whose existence is only in the interest of the manufacturer. The most prominent …

Software doping–Theory and detection

S Biewer - 2023 - publikationen.sulb.uni-saarland.de
Software is doped if it contains a hidden functionality that is intentionally included by the
manufacturer and is not in the interest of the user or society. This thesis complements this …

Configurable-by-construction runtime monitoring

C Dubslaff, MA Köhl - … Symposium on Leveraging Applications of Formal …, 2022 - Springer
Most modern systems, be it cyber-physical or mere software systems, are highly
configurable. The main challenge when dealing with such configurable systems stems from …

Integrating FRET with Copilot: Automated Translation of Natural Language Requirements to Runtime Monitors

I Perez, A Mavridou, T Pressburger, A Goodloe… - 2022 - ntrs.nasa.gov
Runtime verification (RV) enables monitoring systems at runtime, to detect property
violations early and limit their potential consequences. To provide the level of assurance …

Consequences of Enterprise Social Media Network Positions for Employees

S Sebastian, L Sven, S Heidi - 2023 - dlib.phenikaa-uni.edu.vn
Employees often use enterprise social media (ESM) for communication, collaboration, and
knowledge sharing, leading to ESM networks–that is, social networks of interrelated …