Predictive Runtime Verification of Java Programs

Article Preview

Abstract:

For some key fields like energy, traffic, etc., the system software has high reliability demands, so that monitors not only need to pay attention on the current action of the system, but also the prediction of future software behavior to avoid disaster. However once been deployed, the only determinate characteristic can be used to predict is just the static software information. In this paper, we construct the method for getting the monitor which can predict the future event at runtime, and experiment to study the effect on the origin program. The results demonstrate that the predictive monitor is generally helpful.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

333-336

Citation:

Online since:

December 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. d'Amorim and K. Havelund. Event-based runtime verification of Java programs. ACM SIGSOFT Software Engineering Notes, pp.1-7, 30(4), (2005).

DOI: 10.1145/1082983.1083249

Google Scholar

[2] Chen, F., D'Amorim, M., Roşu, G.: Checking and correcting behaviors of Java programs at runtime with JavaMOP. In: Runtime Verification (RV 2006). ENTCS, vol. 144, pp.3-20 , (2006).

DOI: 10.1016/j.entcs.2006.02.002

Google Scholar

[3] X. Zhang, M. Leucker and W. Dong, Runtime verification with predictive semantics. Lecture Notes in Computer Science, pp.418-432, (2012).

DOI: 10.1007/978-3-642-28891-3_37

Google Scholar

[4] Chen, F., Şerbănuţă, T.F., Roşu, G. jPredictor: a predictive runtime analysis tool for Java. In: International Conference on Software Engineering (ICSE 2008), pp.221-230. ACM, New York, (2008).

DOI: 10.1145/1368088.1368119

Google Scholar

[5] K. Yu, Zb Chen and W. Dong, A Predictive Runtime Verification Framework for Cyber-Physical Systems. In International Workshop on Safety and Security in Cyber Physical Systems (2014).

DOI: 10.1109/sere-c.2014.43

Google Scholar

[6] Jvmti. http: /docs. oracle. com/javase/1. 5. 0/docs/guide/jvmti/jvmti. html.

Google Scholar

[7] Vallee-RaiR. Soot:A Java Bytecode Optimization Framework. October, 2000. http:/www. sable. mcgill. ca/pubIications/thesis/Reference.

Google Scholar

[8] Blackburn, S.M., Garner, R., Hoffman, C., Khan, A.M., McKinley, K.S., Bentzur, R., Diwan, A., Feinberg, D., Frampton, D., Guyer, S.Z., Hirzel, M., Hosking, A., Jump, M., Lee, H., Moss, J.E.B., Phansalkar, A., Stefanović, D., VanDrunen, T., von Dincklage, D., Wiedermann, B.: The DaCapo benchmarks: Java benchmarking development and analysis. In: Object-Oriented Programming, Systems, Languages and Applications (OOPSLA 2006), p.169–190. ACM, New York, (2006).

DOI: 10.1145/1167473.1167488

Google Scholar

[9] A. Bauer, M. Leucker and C. Schallhart. Runtime verification for LTL and TLTL. ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 20, p.14, (2011).

DOI: 10.1145/2000799.2000800

Google Scholar

[10] AspectJ. http: /eclipse. org/aspectj.

Google Scholar