Runtime Verification 22nd International Conference, RV 2022, Tbilisi, Georgia, September 28-30, 2022, Proceedings
This book constitutes the refereed proceedings of the 22nd International Conference on Runtime Verification, RV 2022, held in Tbilisi, Georgia, during September 28-30, 2022. The 12 regular papers and 10 short papers presented in this book were carefully reviewed and selected from 40 submissions. The...
Saved in:
Main Authors | , |
---|---|
Format | eBook Conference Proceeding |
Language | English |
Published |
Cham
Springer International Publishing AG
2022
Springer International Publishing |
Edition | 1 |
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This book constitutes the refereed proceedings of the 22nd International Conference on Runtime Verification, RV 2022, held in Tbilisi, Georgia, during September 28-30, 2022. The 12 regular papers and 10 short papers presented in this book were carefully reviewed and selected from 40 submissions. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. Runtime verification techniques are crucial for system correctness, reliability, and robustness; they provide an additional level of rigor and effectiveness compared to conventional testing, and are generally more practical than exhaustive formal verification. |
---|---|
AbstractList | This book constitutes the refereed proceedings of the 22nd International Conference on Runtime Verification, RV 2022, held in Tbilisi, Georgia, during September 28-30, 2022. The 12 regular papers and 10 short papers presented in this book were carefully reviewed and selected from 40 submissions. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. Runtime verification techniques are crucial for system correctness, reliability, and robustness; they provide an additional level of rigor and effectiveness compared to conventional testing, and are generally more practical than exhaustive formal verification. |
Author | Stolz, Volker Dang, Thao |
Author_xml | – sequence: 1 fullname: Dang, Thao – sequence: 2 fullname: Stolz, Volker |
BookMark | eNpVkD1PwzAQhg0URFu6sbCxIQbTu5xjxyNU5UOqhIRQV8tNLhAakhKn8PdJGxamk5573le6G4lBVVcsxAXCDQKYqTWJJAmEEg1aLelATDpGHdkDOhRD1IiSSNmjf7tYD8QQCCJpjaITMUJSGmOII30qJiF8AEBkiBIdD8X5y7Zqi0--XHJT5EXq26KuzsRx7svAk785Fsv7-evsUS6eH55mtwvpUZlISSbKINKcrlax9TqyGTJTajKOE-8te6vZZJQkOYDyOqHYMluTR6SN6jpoLK77Yh_W_BPe67IN7rvkVV2vg_t3b-dOezdsmqJ648b1FoLbfWxnO3Kd7_YBt0tc9YlNU39tObRuX5xy1Ta-dPO7mUFAqxT9And_YoQ |
ContentType | eBook Conference Proceeding |
Copyright | The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022. Chapters 10, 11, 20 and 21 are licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/). For further details see license information in the chapters. |
Copyright_xml | – notice: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022. Chapters 10, 11, 20 and 21 are licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/). For further details see license information in the chapters. |
DEWEY | 005.14 |
DOI | 10.1007/978-3-031-17196-3 |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9783031171963 3031171969 |
EISSN | 1611-3349 |
Edition | 1 |
Editor | Stolz, Volker Dang, Thao |
Editor_xml | – sequence: 1 givenname: Thao orcidid: 0000-0002-3637-1415 surname: Dang fullname: Dang, Thao email: thao.dang@imag.fr – sequence: 2 givenname: Volker orcidid: 0000-0002-1031-6936 surname: Stolz fullname: Stolz, Volker email: vsto@hvl.no |
ExternalDocumentID | 9783031171963 527386 EBC7101944 |
GroupedDBID | 38. AABBV AAZWU ABSVR ABTHU ABVND ACBPT ACHZO ACPMC ADNVS AEDXK AEJLV AEKFX AHVRR AIYYB ALMA_UNASSIGNED_HOLDINGS BBABE CZZ IEZ SBO TPJZQ TSXQS Z5O Z7R Z7S Z7U Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 Z7V Z82 |
ID | FETCH-LOGICAL-a14724-e33d026ecbb59a629d1ee3c7de58aa9ea96e7d388f004a68359ee97f23674a143 |
ISBN | 9783031171956 3031171950 |
ISSN | 0302-9743 |
IngestDate | Fri Nov 08 03:58:56 EST 2024 Tue Jul 29 20:36:23 EDT 2025 Sat May 31 00:02:45 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
LCCallNum_Ident | QA76.758 |
Language | English |
LinkModel | OpenURL |
MeetingName | International Conference on Runtime Verification |
MergedId | FETCHMERGED-LOGICAL-a14724-e33d026ecbb59a629d1ee3c7de58aa9ea96e7d388f004a68359ee97f23674a143 |
OCLC | 1346150526 |
PQID | EBC7101944 |
PageCount | 357 |
ParticipantIDs | askewsholts_vlebooks_9783031171963 springer_books_10_1007_978_3_031_17196_3 proquest_ebookcentral_EBC7101944 |
PublicationCentury | 2000 |
PublicationDate | 2022 2022-09-23 |
PublicationDateYYYYMMDD | 2022-01-01 2022-09-23 |
PublicationDate_xml | – year: 2022 text: 2022 |
PublicationDecade | 2020 |
PublicationPlace | Cham |
PublicationPlace_xml | – name: Cham |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSeriesTitleAlternate | Lect.Notes Computer |
PublicationYear | 2022 |
Publisher | Springer International Publishing AG Springer International Publishing |
Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
RelatedPersons | Hartmanis, Juris Gao, Wen Steffen, Bernhard Bertino, Elisa Goos, Gerhard Yung, Moti |
RelatedPersons_xml | – sequence: 1 givenname: Gerhard surname: Goos fullname: Goos, Gerhard – sequence: 2 givenname: Juris surname: Hartmanis fullname: Hartmanis, Juris – sequence: 3 givenname: Elisa surname: Bertino fullname: Bertino, Elisa – sequence: 4 givenname: Wen surname: Gao fullname: Gao, Wen – sequence: 5 givenname: Bernhard orcidid: 0000-0001-9619-1558 surname: Steffen fullname: Steffen, Bernhard – sequence: 6 givenname: Moti orcidid: 0000-0003-0848-0873 surname: Yung fullname: Yung, Moti |
SSID | ssj0002733865 ssj0002792 |
Score | 2.5844338 |
Snippet | This book constitutes the refereed proceedings of the 22nd International Conference on Runtime Verification, RV 2022, held in Tbilisi, Georgia, during... |
SourceID | askewsholts springer proquest |
SourceType | Aggregation Database Publisher |
SubjectTerms | Computer Science Computer software Software Engineering/Programming and Operating Systems |
Subtitle | 22nd International Conference, RV 2022, Tbilisi, Georgia, September 28-30, 2022, Proceedings |
TableOfContents | Intro -- Preface -- Organization -- Learning by Bootstrapping of Latents (Abstract) -- Contents -- Full Papers -- Randomized First-Order Monitoring with Hashing -- 1 Introduction -- 2 Temporal-Relational Algebra -- 3 Algorithmic Details -- 3.1 Hash Abstractions -- 3.2 Expression Rewriting -- 4 Analysis of the Algorithm -- 4.1 Error Bounds -- 4.2 Space Complexity -- 5 Implementation and Evaluation -- 6 Related Work -- 7 Conclusion -- References -- Automated Surgical Procedure Assistance Framework Using Deep Learning and Formal Runtime Monitoring -- 1 Introduction -- 2 Overview of the Proposed System -- 3 Surgical Tool Detection -- 3.1 Faster-RCNN -- 3.2 Dataset -- 3.3 Implementation -- 3.4 Model Performance -- 4 Formal Runtime Monitoring -- 5 Experimentation -- 6 Related Work -- 6.1 Object Detection -- 6.2 Formal Runtime Monitoring -- 7 Conclusion and Future Work -- References -- Relaxing Safety for Metric First-Order Temporal Logic via Dynamic Free Variables -- 1 Introduction -- 2 Metric First-Order Temporal Logic -- 3 Relaxation of Safety -- 4 Implementation of Dual Operators -- 5 Monitoring Examples -- 6 Correctness -- 7 Conclusion -- A Appendix: Formal Definitions -- References -- Rule-Based Runtime Mitigation Against Poison Attacks on Neural Networks -- 1 Introduction -- 2 Background -- 3 Approach -- 3.1 Generation of Neuron Patterns with Prophecy -- 3.2 Pattern-Based Correction -- 3.3 Input-Based Correction -- 3.4 Algorithm for Runtime Analysis -- 4 Case Studies -- 4.1 Attack Techniques and Baselines -- 4.2 Experiment Setup -- 4.3 Discussion of Results -- 5 Related Work -- 6 Conclusion -- References -- Optimizing Prestate Copies in Runtime Verification of Function Postconditions -- 1 Introduction -- 2 A Minimal Language with Contracts -- 3 Capturing the Prestate -- 3.1 Introducing Copies -- 3.2 Moving old Upwards to Copy Less 3 TeSSLa Compilers and Backends -- 4 Observation and Instrumentation -- 5 The TeSSLa Ecosystem -- 6 Conclusion -- References -- Real-Time Visualization of Stream-Based Monitoring Data -- 1 Introduction -- 1.1 Related Work -- 2 RTLola -- 3 Generating Visualization Data -- 3.1 Data Synchronization and Interpolation -- 3.2 Data Filtering and Aggregation -- 3.3 Attention Management -- 4 Conclusions -- References -- Automating Numerical Parameters Along the Evolution of a Nonlinear System -- 1 Introduction -- 2 Methodology -- 2.1 General Approach -- 2.2 Constructing and Exploring the Search Space -- 2.3 Ranking the Search Points -- 3 Preliminary Experimental Results -- 4 Conclusions -- References -- Correction to: Rule-Based Runtime Mitigation Against Poison Attacks on Neural Networks -- Correction to: Chapter "Rule-Based Runtime Mitigation Against Poison Attacks on Neural Networks" in: T. Dang and V. Stolz (Eds.): Runtime Verification, LNCS 13498, https://doi.org/10.1007/978-3-031-17196-3_4 -- Author Index 5 Discussion and Conclusions -- References -- Towards Specificationless Monitoring of Provenance-Emitting Systems -- 1 Introduction -- 2 Related Work -- 3 Provenance Graphs -- 4 Monitoring Provenance-Emitting Systems -- 5 Anomaly Detection with Spectral Graph Theory -- 5.1 Compute Coordinates -- 5.2 Compute Distance -- 5.3 Proof of Concept -- 6 Conclusion and Future Work -- References -- A Python Library for Trace Analysis -- 1 Introduction -- 2 The PyContract Library -- 2.1 Example 1 -- 2.2 Example 2 -- 3 Comparison with Other Frameworks -- 4 Conclusion -- References -- Lock Contention Performance Classification for Java Intrinsic Locks -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset Creation -- 3.2 Feature Engineering and Classification -- 4 Cluster Analysis -- 5 Conclusions -- References -- TestSelector: Automatic Test Suite Selection for Student Projects -- 1 Introduction -- 2 TestSelector Overview -- 3 Evaluation -- 3.1 RQ1: TestSelector Extensibility -- 3.2 RQ2: Classical Code Coverage Selection -- 3.3 RQ3: Linear Combinations of Coverage Measures -- 4 Related Work and Conclusions -- References -- Decent: A Benchmark for Decentralized Enforcement -- 1 Introduction -- 2 Principles of Decentralized Enforcement -- 3 Decent Overview -- 4 Evaluating the Algorithms -- 4.1 Metrics -- 4.2 Experiments -- 5 Related Work -- 6 Conclusions -- A Third experiment -- References -- Runtime Verification for FMI-Based Co-simulation -- 1 Introduction -- 2 Background -- 2.1 Co-simulation -- 2.2 Runtime Verification for First-Order LTL -- 3 Online Runtime Verification of FMI-Based Co-simulation -- 3.1 FMI Master Algorithm for Runtime Verification -- 3.2 FMU for Runtime Verification -- 4 Experimental Results -- 5 Conclusion -- References -- TeSSLa - An Ecosystem for Runtime Verification -- 1 Introduction -- 2 The TeSSLa Specification Language 5.1 BFS Blockchains -- 5.2 DFS Blockchains -- 6 Conclusion and Future Work -- References -- Anticipatory Recurrent Monitoring with Uncertainty and Assumptions -- 1 Introduction -- 2 Preliminaries -- 2.1 Well-Known Monitor Constructions -- 3 Initial and Recurrent Monitoring -- 4 Anticipatory Monitoring -- 4.1 Anticipatory Monitors from Recurrent Monitors -- 5 Uncertainty and Assumptions -- 5.1 Uncertainty -- 5.2 Assumptions -- 6 Conclusion -- References -- Abstract Monitors for Quantitative Specifications -- 1 Introduction -- 2 Definitional Framework -- 2.1 Quantitative Specifications -- 2.2 Abstract Monitors -- 2.3 Resource Use of Abstract Monitors -- 3 Approximate Prompt Monitoring -- 3.1 Uniqueness of Resource-Optimal Prompt Monitors -- 3.2 Structure of Resource-Optimal Prompt Monitors -- 3.3 Unbounded Precision-Resource Trade-Offs for Prompt Monitors -- 4 Approximate Limit Monitoring -- 4.1 Specifications with Resource-Intensive Limit Behavior -- 4.2 Reversible Specifications -- 5 Conclusion and Future Work -- References -- Runtime Verification of Kotlin Coroutines -- 1 Introduction -- 2 Background: Coroutines in Kotlin -- 3 Informal Description of Properties -- 3.1 Property 1: DestroyedWithOwner -- 3.2 Property 2: NormalAsync -- 3.3 Property 3: ExceptionalAsync -- 3.4 Property 4: NeedHandler -- 3.5 Property 5: NoBlockUI -- 3.6 Property 6: UpdateUI -- 3.7 Property 7: ResumeIfNeeded -- 3.8 Properties Summarised -- 4 A Coroutine-Aware Specification Language -- 5 Monitoring Kotlin Coroutines -- 6 Implementation and Evaluation -- 7 Related Work -- 8 Concluding Remarks -- References -- Short and Tool Papers -- AspectSol: A Solidity Aspect-Oriented Programming Tool with Applications in Runtime Verification -- 1 Introduction -- 2 Aspect-Oriented Programming -- 3 Smart Contract AOP: Design Considerations -- 4 Runtime Verification Using AspectSol 4 Example and Benchmarks -- 4.1 A Maze Generator -- 4.2 Runtime Verification with Ortac -- 4.3 Benchmarks -- 5 Related Work -- 6 Conclusion and Future Work -- A Term Semantics -- B Predicate Semantics -- C Program Semantics -- D Typing Rules -- References -- A Barrier Certificate-Based Simplex Architecture with Application to Microgrids*-10pt -- 1 Introduction -- 2 Preliminaries -- 3 Deriving the Switching Condition -- 3.1 Forward Switching Condition -- 3.2 Reverse Switching Condition -- 3.3 Decision Logic -- 4 Application to Microgrids -- 4.1 Baseline Controller -- 4.2 Neural Controller -- 4.3 Adaptation Module -- 5 Experimental Evaluation -- 5.1 Integration of Bb-Simplex in RTDS -- 5.2 Evaluation of Forward Switching Condition -- 5.3 Evaluation of Neural Controller -- 5.4 Evaluation of Adaptation Module -- 6 Related Work -- 7 Conclusion -- References -- Optimal Finite-State Monitoring of Partial Traces -- 1 Introduction -- 2 Overview -- 3 Basic Definitions -- 3.1 Notation -- 3.2 Definitions -- 4 Losses, Alternate Monitors, Soundness and Optimality -- 5 Optimal Monitor and Losses as Transducers -- 5.1 Discussion and Significance for Implementation -- 6 Framework Instantiations -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Tainting in Smart Contracts: Combining Static and Runtime Verification -- 1 Introduction -- 2 Solidity with Dynamic Tainting -- 2.1 Simplified Solidity with Taints -- 2.2 Semantics -- 2.3 Implementation -- 3 Static Analysis -- 3.1 Abstract Semantics -- 3.2 Analysis and Optimisation -- 4 Case Study -- 5 Discussion -- 6 Conclusions -- References -- Transaction Monitoring of Smart Contracts -- 1 Introduction -- 2 Model of Computation -- 3 Transaction Monitors -- 3.1 Transaction Monitors -- 3.2 Transaction Monitors in BFS/DFS -- 4 Execution Mechanisms -- 5 Implementing Transaction Monitors |
Title | Runtime Verification |
URI | https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=7101944 http://link.springer.com/10.1007/978-3-031-17196-3 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783031171963 |
Volume | 13498 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT9swFLcGu8BlHxTRMaZo4oCEgkjs-OPAAVAnVBWEEFS9WY7zcgGKRLMd9tfvObGTtOoBdonypefYP-f5fZuQQ6s4SGZPY1DGxsxKFwTAaSxNCQk3NC3rRNrrG371wMazbNYVPaqzS6r8xP5dm1fyP6jiPcTVZcm-A9mWKN7Ac8QXj4gwHleE37XrzJ3b5uEZjqfYVultbw2XcNWLF2cT7x-4eanqsKvjsIVD-KP7Kn-arqj8weS3YjTs7FZLOiKuUUkiXFpgj7VQ5IOoSTSsBRrWx11BQ9oUEG15I17LtZy2H1yBLcSuCR7Tbllpg_3qEm98g2wIiZzz4_loPJm2ZjB81uw6uhWulXf8NB_o0nFCB3yJrq5DwUvtCwUvfcg22TaLR1wocBGpFkv6w4rLu5Yk7j-TQZdjGd22qH4hH2D-lXwKCEUeoR2y41GO-igPyPTX6P7yKvZbWcQmYSJlMVBaoLoLNs8zZXiqigSAWlFAJo1RYPCfEQWVssT5bTjKxQpAidIV2GNIg-6SzfnLHPZIJC2FHNlmapPSKbxGZIUsSpGpPGF5KYbkZ6_n-s9T7XZf6N7QcTokURgQXT_3scB6dHGJQmeiGBuSozBQuqEQSlwjJU010tI1MU2_vf3VfbLVTenvZLN6_Q0HKNdV-Q8_N_4BnJVAhw |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Runtime+Verification&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2022-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783031171956&rft.issn=0302-9743&rft.eissn=1611-3349&rft.volume=13498&rft_id=info:doi/10.1007%2F978-3-031-17196-3&rft.externalDocID=527386 |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97830311%2F9783031171963.jpg |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-3-031-17196-3 |