Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems 2010
DOI: 10.1145/1868433.1868438
|View full text |Cite
|
Sign up to set email alerts
|

Monitor petri nets for security monitoring

Abstract: In our integrated model-based development process for security monitors, we use Live Sequence Charts (LSCs) as expressive, formal specification. Generating target specific monitors from these, requires a complex interpretation of their syntax and semantics. In this paper, we propose a Petri Net dialect as an intermediate language for monitor generation-named Monitor Petri Nets (MPNs). It is based on standard Petri Nets that are syntactically and semantically extended to suit the needs of monitoring. With our M… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…(3) LSCs are well defined and posses a strict formal semantics [1]. These descriptions are translated in the formally defined Monitor Petri nets [13] to enable a generic code generation for different target platforms. For this reason, simulation and analysis can be performed to verify the correctness of the specification.…”
Section: -Predictive the Modeled Specifications Should Have A Definementioning
confidence: 99%
See 1 more Smart Citation
“…(3) LSCs are well defined and posses a strict formal semantics [1]. These descriptions are translated in the formally defined Monitor Petri nets [13] to enable a generic code generation for different target platforms. For this reason, simulation and analysis can be performed to verify the correctness of the specification.…”
Section: -Predictive the Modeled Specifications Should Have A Definementioning
confidence: 99%
“…These abstract specifications are described in more detail with LSCs. Through automatic transformation and weaving of system-specific information, a security monitor is automatically generated, using the intermediate Monitor Petri net language [13]. Our contributions in this paper are:…”
Section: Introductionmentioning
confidence: 99%