Affiliation:
1. NICTA and Australian National University
2. Technische Universität München
3. Technische Universität Darmstadt
Abstract
This article studies runtime verification of properties expressed either in lineartime temporal logic (LTL) or timed lineartime temporal logic (TLTL). It classifies runtime verification in identifying its distinguishing features to model checking and testing, respectively. It introduces a three-valued semantics (with truth values
true, false, inconclusive
) as an adequate interpretation as to whether a partial observation of a running system meets an LTL or TLTL property.
For LTL, a conceptually simple monitor generation procedure is given, which is
optimal
in two respects: First, the size of the generated deterministic monitor is
minimal
, and, second, the monitor identifies a continuously monitored trace as either satisfying or falsifying a property
as early as possible
. The feasibility of the developed methodology is demontrated using a collection of real-world temporal logic specifications. Moreover, the presented approach is related to the properties monitorable in general and is compared to existing concepts in the literature. It is shown that the set of
monitorable properties
does not only encompass the
safety
and
cosafety
properties but is strictly larger.
For TLTL, the same road map is followed by first defining a three-valued semantics. The corresponding construction of a timed monitor is more involved, yet, as shown, possible.
Publisher
Association for Computing Machinery (ACM)
Cited by
365 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CauMon: An Informative Online Monitor for Signal Temporal Logic;Lecture Notes in Computer Science;2024-09-13
2. Runtime Verified Neural Networks for Cyber-Physical Systems;Proceedings of the 7th ACM International Workshop on Verification and Monitoring at Runtime Execution;2024-09-13
3. Efficient Temporal Logic Runtime Monitoring for Tiny Systems;Lecture Notes in Computer Science;2024-09-10
4. Checking Complex Source Code-Level Constraints using Runtime Verification;Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering;2024-07-10
5. Static and Dynamic Analysis of a Usage Control System;Proceedings of the 29th ACM Symposium on Access Control Models and Technologies;2024-06-24