2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems 2015
DOI: 10.1109/mass.2015.15
|View full text |Cite
|
Sign up to set email alerts
|

BraceAssertion: Runtime Verification of Cyber-Physical Systems

Abstract: Abstract-Cyber-Physical Systems (CPS) have gained wide popularity, however, developing and debugging CPS remain significant challenges. Many bugs are detectable only at runtime under deployment conditions that may be unpredictable or at least unexpected at development time. The current state of the practice of debugging CPS is generally ad hoc, involving trial and error in a real deployment. For increased rigor, it is appealing to bring formal methods to CPS verification. However developers often eschew formal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 30 publications
0
10
0
Order By: Relevance
“…On the other hand, runtime verification where properties are formally specified and checked at runtime, receives a lot of attention to verify real-time systems. In Zheng et al (2015a), runtime monitors can check both qualitative (e.g., safety, liveness) and quantitative (e.g., bounded safety and liveness, responsiveness) properties. However, to detect the insidious real-time systems bugs that are manifest only in a specific deployment environment, runtime verification techniques require repetitive deployments that are either too expensive (e.g., in labor, time, and/or money), dangerous (e.g., involving autonomous vehicles), or infeasible.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, runtime verification where properties are formally specified and checked at runtime, receives a lot of attention to verify real-time systems. In Zheng et al (2015a), runtime monitors can check both qualitative (e.g., safety, liveness) and quantitative (e.g., bounded safety and liveness, responsiveness) properties. However, to detect the insidious real-time systems bugs that are manifest only in a specific deployment environment, runtime verification techniques require repetitive deployments that are either too expensive (e.g., in labor, time, and/or money), dangerous (e.g., involving autonomous vehicles), or infeasible.…”
Section: Resultsmentioning
confidence: 99%
“…A lot of research efforts has been made to improve and ensure the reliability of such systems. For instance, formal methods (Zheng et al 2015bCassez et al 2017;Bouyer et al 2011;Zheng 2014) and testing have been widely used to improve the quality in real-time systems. However, the tighter coupling between physical processes and software components in the modern real-time systems along with the varying spatial and temporal runtime contexts made such system exhibit diverse behaviors across runs (Zheng et al 2017a).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…2) Real-time Simulation and Formal Verification: On a separate regard, the industry is adopting real-time simulation and formal verification as part of security compliance check for intelligent vehicles [78], [202], [203]. In real-time simulation, computer models are used to accurately re-create repetitive and flexible test environment for vehicular systems [160] while formal verification provides security guarantee [204], [205]. As a promising future direction, deep learning based models can be combined with real-time simulation and formal verification to provide more rigid yet accurate security assurance.…”
Section: High Accuracy Computational Complexitymentioning
confidence: 99%
“…Cloud computing is a broad topic with equally broad security issues and surrounding threats and challenges. In order to protect the cloud computing service providers and cloud consumer, effective runtime verification [23,24,20,6,25] along with anomaly and signature based intrusion detections system are strongly recommended to handle the emerging and evolving security threats in cloud computing [9,12]. Anomaly based intrusion detection system analyzes all the network traffics and detects the abnormal behaviors of network packets and applications.…”
Section: Shared Technology Issuesmentioning
confidence: 99%