2017 IEEE/ACM 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) 2017
DOI: 10.1109/seams.2017.9
|View full text |Cite
|
Sign up to set email alerts
|

Policy Enforcement with Proactive Libraries

Abstract: Software libraries implement APIs that deliver reusable functionalities. To correctly use these functionalities, software applications must satisfy certain correctness policies, for instance policies about the order some API methods can be invoked and about the values that can be used for the parameters. If these policies are violated, applications may produce misbehaviors and failures at runtime. Although this problem is general, applications that incorrectly use API methods are more frequent in certain conte… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
28
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3

Relationship

4
3

Authors

Journals

citations
Cited by 22 publications
(30 citation statements)
references
References 31 publications
2
28
0
Order By: Relevance
“…97% of the analyzed studies employ simulators to mimic a real SHS in their performance evaluations. We identified a single study (3%) that executes a real system to evaluate the performance of SHS [21]. This is inline with the related finding of [6], which suggests that simulation-based experiments are the most dominant approach employed for the evaluation of SAS in general.…”
Section: Rq1supporting
confidence: 61%
See 1 more Smart Citation
“…97% of the analyzed studies employ simulators to mimic a real SHS in their performance evaluations. We identified a single study (3%) that executes a real system to evaluate the performance of SHS [21]. This is inline with the related finding of [6], which suggests that simulation-based experiments are the most dominant approach employed for the evaluation of SAS in general.…”
Section: Rq1supporting
confidence: 61%
“…Our literature review identifies a single paper using a real system for the evaluation of SHS [21]. In this paper, failures are not artificially injected to the system and occur as the real system equipped with self-healing properties is executed in its real operational environment.…”
Section: Rq2mentioning
confidence: 99%
“…Research on runtime enforcement has already delivered both theoretical [16,10,12,17] and practical results [15,11,13,19]. However, identifying policies, specifying enforcement strategies, and implementing the corresponding enforcers is still a difficult and time consuming task.…”
Section: Discussionmentioning
confidence: 99%
“…Let us refer to the Plumeria 2 app, a simple Android app, to illustrate the concept of proactive library [19]. Plumeria has a fault, that is, one of its activities does not release the camera when it is suspended, as a consequence the camera becomes inaccessible to the other apps of the device.…”
Section: Proactive Librariesmentioning
confidence: 99%
“…Conclusions. The reliability of software applications can be improved by exploiting advanced execution environments equipped with mechanisms to enforce correctness policies, such as security [16,27] and resource usage policies [32,16]. Although enforcers can be effective when used in isolation, their effect on the application and the execution environment when executed jointly might be hard to predict and potentially harmful.…”
Section: Discussionmentioning
confidence: 99%