Fifth International Workshop on Dynamic Analysis (WODA '07) 2007
DOI: 10.1109/woda.2007.8
|View full text |Cite
|
Sign up to set email alerts
|

Runtime Checking of UML Association-Related Constraints

Abstract: UML class models are important design artifacts used as blueprints of software systems to be built. Yet, implementations are often inconsistent with their models. Although many techniques have been proposed to tackle this problem, some dynamic aspects of a class model are still hard to be verified using existing techniques. In this paper, we present an approach to checking the UML association-related constraints during a program's execution. Our approach instruments event notification mechanism into Java bytec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Once more, this approach designs its own domain-specific language instead of building on top of UML. There are also some approaches that aim to verify structural constraints during runtime, for example, class and component relationships [26][27][28]. Our approach, on the other hand, targets dynamic behavior during runtime.…”
Section: Related Workmentioning
confidence: 99%
“…Once more, this approach designs its own domain-specific language instead of building on top of UML. There are also some approaches that aim to verify structural constraints during runtime, for example, class and component relationships [26][27][28]. Our approach, on the other hand, targets dynamic behavior during runtime.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we focus particularly on the specification of constraints to be monitored at runtime, and tools that automatically generate runtime monitors from these specifications. In recent years, three classes of techniques have established themselves as the main focus areas for research: (1) contract-based approaches like JML [3], (2) approaches matching event traces against patterns, usually specified in a form of linear temporal logic (LTL) [8,11,12], regular expressions or context-free grammars [7,9,10,13], and extensions that include more complex data bindings and events [20][21][22][23], and (3) model-based approaches centered around UML-like models [16,17]. There is also a large body of work on other monitoring topics, such as intrusion and malware detection.…”
Section: Related Workmentioning
confidence: 99%
“…Techniques that use core UML are often concerned with monitoring structural constraints, such as class and component relationships [17,28,29]. OCL adds a finer-grained constraint language to UML and allows for deeper semantics, which can be exploited to generate at least simple checks based on program state combined with execution traces [14,16].…”
Section: Model-based Techniquesmentioning
confidence: 99%
See 1 more Smart Citation