Runtime Verification 22nd International Conference, RV 2022, Tbilisi, Georgia, September 28-30, 2022, Proceedings

This book constitutes the refereed proceedings of the 22nd International Conference on Runtime Verification, RV 2022, held in Tbilisi, Georgia, during September 28-30, 2022. The 12 regular papers and 10 short papers presented in this book were carefully reviewed and selected from 40 submissions. The...

Full description

Saved in:
Bibliographic Details
Main Authors Dang, Thao, Stolz, Volker
Format eBook Conference Proceeding
LanguageEnglish
Published Cham Springer International Publishing AG 2022
Springer International Publishing
Edition1
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This book constitutes the refereed proceedings of the 22nd International Conference on Runtime Verification, RV 2022, held in Tbilisi, Georgia, during September 28-30, 2022. The 12 regular papers and 10 short papers presented in this book were carefully reviewed and selected from 40 submissions. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. Runtime verification techniques are crucial for system correctness, reliability, and robustness; they provide an additional level of rigor and effectiveness compared to conventional testing, and are generally more practical than exhaustive formal verification.
AbstractList This book constitutes the refereed proceedings of the 22nd International Conference on Runtime Verification, RV 2022, held in Tbilisi, Georgia, during September 28-30, 2022. The 12 regular papers and 10 short papers presented in this book were carefully reviewed and selected from 40 submissions. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. Runtime verification techniques are crucial for system correctness, reliability, and robustness; they provide an additional level of rigor and effectiveness compared to conventional testing, and are generally more practical than exhaustive formal verification.
Author Stolz, Volker
Dang, Thao
Author_xml – sequence: 1
  fullname: Dang, Thao
– sequence: 2
  fullname: Stolz, Volker
BookMark eNpVkD1PwzAQhg0URFu6sbCxIQbTu5xjxyNU5UOqhIRQV8tNLhAakhKn8PdJGxamk5573le6G4lBVVcsxAXCDQKYqTWJJAmEEg1aLelATDpGHdkDOhRD1IiSSNmjf7tYD8QQCCJpjaITMUJSGmOII30qJiF8AEBkiBIdD8X5y7Zqi0--XHJT5EXq26KuzsRx7svAk785Fsv7-evsUS6eH55mtwvpUZlISSbKINKcrlax9TqyGTJTajKOE-8te6vZZJQkOYDyOqHYMluTR6SN6jpoLK77Yh_W_BPe67IN7rvkVV2vg_t3b-dOezdsmqJ648b1FoLbfWxnO3Kd7_YBt0tc9YlNU39tObRuX5xy1Ta-dPO7mUFAqxT9And_YoQ
ContentType eBook
Conference Proceeding
Copyright The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022. Chapters 10, 11, 20 and 21 are licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/). For further details see license information in the chapters.
Copyright_xml – notice: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022. Chapters 10, 11, 20 and 21 are licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/). For further details see license information in the chapters.
DEWEY 005.14
DOI 10.1007/978-3-031-17196-3
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783031171963
3031171969
EISSN 1611-3349
Edition 1
Editor Stolz, Volker
Dang, Thao
Editor_xml – sequence: 1
  givenname: Thao
  orcidid: 0000-0002-3637-1415
  surname: Dang
  fullname: Dang, Thao
  email: thao.dang@imag.fr
– sequence: 2
  givenname: Volker
  orcidid: 0000-0002-1031-6936
  surname: Stolz
  fullname: Stolz, Volker
  email: vsto@hvl.no
ExternalDocumentID 9783031171963
527386
EBC7101944
GroupedDBID 38.
AABBV
AAZWU
ABSVR
ABTHU
ABVND
ACBPT
ACHZO
ACPMC
ADNVS
AEDXK
AEJLV
AEKFX
AHVRR
AIYYB
ALMA_UNASSIGNED_HOLDINGS
BBABE
CZZ
IEZ
SBO
TPJZQ
TSXQS
Z5O
Z7R
Z7S
Z7U
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
-DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
Z7V
Z82
ID FETCH-LOGICAL-a14724-e33d026ecbb59a629d1ee3c7de58aa9ea96e7d388f004a68359ee97f23674a143
ISBN 9783031171956
3031171950
ISSN 0302-9743
IngestDate Fri Nov 08 03:58:56 EST 2024
Tue Jul 29 20:36:23 EDT 2025
Sat May 31 00:02:45 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum_Ident QA76.758
Language English
LinkModel OpenURL
MeetingName International Conference on Runtime Verification
MergedId FETCHMERGED-LOGICAL-a14724-e33d026ecbb59a629d1ee3c7de58aa9ea96e7d388f004a68359ee97f23674a143
OCLC 1346150526
PQID EBC7101944
PageCount 357
ParticipantIDs askewsholts_vlebooks_9783031171963
springer_books_10_1007_978_3_031_17196_3
proquest_ebookcentral_EBC7101944
PublicationCentury 2000
PublicationDate 2022
2022-09-23
PublicationDateYYYYMMDD 2022-01-01
2022-09-23
PublicationDate_xml – year: 2022
  text: 2022
PublicationDecade 2020
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationYear 2022
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Hartmanis, Juris
Gao, Wen
Steffen, Bernhard
Bertino, Elisa
Goos, Gerhard
Yung, Moti
RelatedPersons_xml – sequence: 1
  givenname: Gerhard
  surname: Goos
  fullname: Goos, Gerhard
– sequence: 2
  givenname: Juris
  surname: Hartmanis
  fullname: Hartmanis, Juris
– sequence: 3
  givenname: Elisa
  surname: Bertino
  fullname: Bertino, Elisa
– sequence: 4
  givenname: Wen
  surname: Gao
  fullname: Gao, Wen
– sequence: 5
  givenname: Bernhard
  orcidid: 0000-0001-9619-1558
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 6
  givenname: Moti
  orcidid: 0000-0003-0848-0873
  surname: Yung
  fullname: Yung, Moti
SSID ssj0002733865
ssj0002792
Score 2.5844338
Snippet This book constitutes the refereed proceedings of the 22nd International Conference on Runtime Verification, RV 2022, held in Tbilisi, Georgia, during...
SourceID askewsholts
springer
proquest
SourceType Aggregation Database
Publisher
SubjectTerms Computer Science
Computer software
Software Engineering/Programming and Operating Systems
Subtitle 22nd International Conference, RV 2022, Tbilisi, Georgia, September 28-30, 2022, Proceedings
TableOfContents Intro -- Preface -- Organization -- Learning by Bootstrapping of Latents (Abstract) -- Contents -- Full Papers -- Randomized First-Order Monitoring with Hashing -- 1 Introduction -- 2 Temporal-Relational Algebra -- 3 Algorithmic Details -- 3.1 Hash Abstractions -- 3.2 Expression Rewriting -- 4 Analysis of the Algorithm -- 4.1 Error Bounds -- 4.2 Space Complexity -- 5 Implementation and Evaluation -- 6 Related Work -- 7 Conclusion -- References -- Automated Surgical Procedure Assistance Framework Using Deep Learning and Formal Runtime Monitoring -- 1 Introduction -- 2 Overview of the Proposed System -- 3 Surgical Tool Detection -- 3.1 Faster-RCNN -- 3.2 Dataset -- 3.3 Implementation -- 3.4 Model Performance -- 4 Formal Runtime Monitoring -- 5 Experimentation -- 6 Related Work -- 6.1 Object Detection -- 6.2 Formal Runtime Monitoring -- 7 Conclusion and Future Work -- References -- Relaxing Safety for Metric First-Order Temporal Logic via Dynamic Free Variables -- 1 Introduction -- 2 Metric First-Order Temporal Logic -- 3 Relaxation of Safety -- 4 Implementation of Dual Operators -- 5 Monitoring Examples -- 6 Correctness -- 7 Conclusion -- A Appendix: Formal Definitions -- References -- Rule-Based Runtime Mitigation Against Poison Attacks on Neural Networks -- 1 Introduction -- 2 Background -- 3 Approach -- 3.1 Generation of Neuron Patterns with Prophecy -- 3.2 Pattern-Based Correction -- 3.3 Input-Based Correction -- 3.4 Algorithm for Runtime Analysis -- 4 Case Studies -- 4.1 Attack Techniques and Baselines -- 4.2 Experiment Setup -- 4.3 Discussion of Results -- 5 Related Work -- 6 Conclusion -- References -- Optimizing Prestate Copies in Runtime Verification of Function Postconditions -- 1 Introduction -- 2 A Minimal Language with Contracts -- 3 Capturing the Prestate -- 3.1 Introducing Copies -- 3.2 Moving old Upwards to Copy Less
3 TeSSLa Compilers and Backends -- 4 Observation and Instrumentation -- 5 The TeSSLa Ecosystem -- 6 Conclusion -- References -- Real-Time Visualization of Stream-Based Monitoring Data -- 1 Introduction -- 1.1 Related Work -- 2 RTLola -- 3 Generating Visualization Data -- 3.1 Data Synchronization and Interpolation -- 3.2 Data Filtering and Aggregation -- 3.3 Attention Management -- 4 Conclusions -- References -- Automating Numerical Parameters Along the Evolution of a Nonlinear System -- 1 Introduction -- 2 Methodology -- 2.1 General Approach -- 2.2 Constructing and Exploring the Search Space -- 2.3 Ranking the Search Points -- 3 Preliminary Experimental Results -- 4 Conclusions -- References -- Correction to: Rule-Based Runtime Mitigation Against Poison Attacks on Neural Networks -- Correction to: Chapter "Rule-Based Runtime Mitigation Against Poison Attacks on Neural Networks" in: T. Dang and V. Stolz (Eds.): Runtime Verification, LNCS 13498, https://doi.org/10.1007/978-3-031-17196-3_4 -- Author Index
5 Discussion and Conclusions -- References -- Towards Specificationless Monitoring of Provenance-Emitting Systems -- 1 Introduction -- 2 Related Work -- 3 Provenance Graphs -- 4 Monitoring Provenance-Emitting Systems -- 5 Anomaly Detection with Spectral Graph Theory -- 5.1 Compute Coordinates -- 5.2 Compute Distance -- 5.3 Proof of Concept -- 6 Conclusion and Future Work -- References -- A Python Library for Trace Analysis -- 1 Introduction -- 2 The PyContract Library -- 2.1 Example 1 -- 2.2 Example 2 -- 3 Comparison with Other Frameworks -- 4 Conclusion -- References -- Lock Contention Performance Classification for Java Intrinsic Locks -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset Creation -- 3.2 Feature Engineering and Classification -- 4 Cluster Analysis -- 5 Conclusions -- References -- TestSelector: Automatic Test Suite Selection for Student Projects -- 1 Introduction -- 2 TestSelector Overview -- 3 Evaluation -- 3.1 RQ1: TestSelector Extensibility -- 3.2 RQ2: Classical Code Coverage Selection -- 3.3 RQ3: Linear Combinations of Coverage Measures -- 4 Related Work and Conclusions -- References -- Decent: A Benchmark for Decentralized Enforcement -- 1 Introduction -- 2 Principles of Decentralized Enforcement -- 3 Decent Overview -- 4 Evaluating the Algorithms -- 4.1 Metrics -- 4.2 Experiments -- 5 Related Work -- 6 Conclusions -- A Third experiment -- References -- Runtime Verification for FMI-Based Co-simulation -- 1 Introduction -- 2 Background -- 2.1 Co-simulation -- 2.2 Runtime Verification for First-Order LTL -- 3 Online Runtime Verification of FMI-Based Co-simulation -- 3.1 FMI Master Algorithm for Runtime Verification -- 3.2 FMU for Runtime Verification -- 4 Experimental Results -- 5 Conclusion -- References -- TeSSLa - An Ecosystem for Runtime Verification -- 1 Introduction -- 2 The TeSSLa Specification Language
5.1 BFS Blockchains -- 5.2 DFS Blockchains -- 6 Conclusion and Future Work -- References -- Anticipatory Recurrent Monitoring with Uncertainty and Assumptions -- 1 Introduction -- 2 Preliminaries -- 2.1 Well-Known Monitor Constructions -- 3 Initial and Recurrent Monitoring -- 4 Anticipatory Monitoring -- 4.1 Anticipatory Monitors from Recurrent Monitors -- 5 Uncertainty and Assumptions -- 5.1 Uncertainty -- 5.2 Assumptions -- 6 Conclusion -- References -- Abstract Monitors for Quantitative Specifications -- 1 Introduction -- 2 Definitional Framework -- 2.1 Quantitative Specifications -- 2.2 Abstract Monitors -- 2.3 Resource Use of Abstract Monitors -- 3 Approximate Prompt Monitoring -- 3.1 Uniqueness of Resource-Optimal Prompt Monitors -- 3.2 Structure of Resource-Optimal Prompt Monitors -- 3.3 Unbounded Precision-Resource Trade-Offs for Prompt Monitors -- 4 Approximate Limit Monitoring -- 4.1 Specifications with Resource-Intensive Limit Behavior -- 4.2 Reversible Specifications -- 5 Conclusion and Future Work -- References -- Runtime Verification of Kotlin Coroutines -- 1 Introduction -- 2 Background: Coroutines in Kotlin -- 3 Informal Description of Properties -- 3.1 Property 1: DestroyedWithOwner -- 3.2 Property 2: NormalAsync -- 3.3 Property 3: ExceptionalAsync -- 3.4 Property 4: NeedHandler -- 3.5 Property 5: NoBlockUI -- 3.6 Property 6: UpdateUI -- 3.7 Property 7: ResumeIfNeeded -- 3.8 Properties Summarised -- 4 A Coroutine-Aware Specification Language -- 5 Monitoring Kotlin Coroutines -- 6 Implementation and Evaluation -- 7 Related Work -- 8 Concluding Remarks -- References -- Short and Tool Papers -- AspectSol: A Solidity Aspect-Oriented Programming Tool with Applications in Runtime Verification -- 1 Introduction -- 2 Aspect-Oriented Programming -- 3 Smart Contract AOP: Design Considerations -- 4 Runtime Verification Using AspectSol
4 Example and Benchmarks -- 4.1 A Maze Generator -- 4.2 Runtime Verification with Ortac -- 4.3 Benchmarks -- 5 Related Work -- 6 Conclusion and Future Work -- A Term Semantics -- B Predicate Semantics -- C Program Semantics -- D Typing Rules -- References -- A Barrier Certificate-Based Simplex Architecture with Application to Microgrids*-10pt -- 1 Introduction -- 2 Preliminaries -- 3 Deriving the Switching Condition -- 3.1 Forward Switching Condition -- 3.2 Reverse Switching Condition -- 3.3 Decision Logic -- 4 Application to Microgrids -- 4.1 Baseline Controller -- 4.2 Neural Controller -- 4.3 Adaptation Module -- 5 Experimental Evaluation -- 5.1 Integration of Bb-Simplex in RTDS -- 5.2 Evaluation of Forward Switching Condition -- 5.3 Evaluation of Neural Controller -- 5.4 Evaluation of Adaptation Module -- 6 Related Work -- 7 Conclusion -- References -- Optimal Finite-State Monitoring of Partial Traces -- 1 Introduction -- 2 Overview -- 3 Basic Definitions -- 3.1 Notation -- 3.2 Definitions -- 4 Losses, Alternate Monitors, Soundness and Optimality -- 5 Optimal Monitor and Losses as Transducers -- 5.1 Discussion and Significance for Implementation -- 6 Framework Instantiations -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Tainting in Smart Contracts: Combining Static and Runtime Verification -- 1 Introduction -- 2 Solidity with Dynamic Tainting -- 2.1 Simplified Solidity with Taints -- 2.2 Semantics -- 2.3 Implementation -- 3 Static Analysis -- 3.1 Abstract Semantics -- 3.2 Analysis and Optimisation -- 4 Case Study -- 5 Discussion -- 6 Conclusions -- References -- Transaction Monitoring of Smart Contracts -- 1 Introduction -- 2 Model of Computation -- 3 Transaction Monitors -- 3.1 Transaction Monitors -- 3.2 Transaction Monitors in BFS/DFS -- 4 Execution Mechanisms -- 5 Implementing Transaction Monitors
Title Runtime Verification
URI https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=7101944
http://link.springer.com/10.1007/978-3-031-17196-3
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783031171963
Volume 13498
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT9swFLcGu8BlHxTRMaZo4oCEgkjs-OPAAVAnVBWEEFS9WY7zcgGKRLMd9tfvObGTtOoBdonypefYP-f5fZuQQ6s4SGZPY1DGxsxKFwTAaSxNCQk3NC3rRNrrG371wMazbNYVPaqzS6r8xP5dm1fyP6jiPcTVZcm-A9mWKN7Ac8QXj4gwHleE37XrzJ3b5uEZjqfYVultbw2XcNWLF2cT7x-4eanqsKvjsIVD-KP7Kn-arqj8weS3YjTs7FZLOiKuUUkiXFpgj7VQ5IOoSTSsBRrWx11BQ9oUEG15I17LtZy2H1yBLcSuCR7Tbllpg_3qEm98g2wIiZzz4_loPJm2ZjB81uw6uhWulXf8NB_o0nFCB3yJrq5DwUvtCwUvfcg22TaLR1wocBGpFkv6w4rLu5Yk7j-TQZdjGd22qH4hH2D-lXwKCEUeoR2y41GO-igPyPTX6P7yKvZbWcQmYSJlMVBaoLoLNs8zZXiqigSAWlFAJo1RYPCfEQWVssT5bTjKxQpAidIV2GNIg-6SzfnLHPZIJC2FHNlmapPSKbxGZIUsSpGpPGF5KYbkZ6_n-s9T7XZf6N7QcTokURgQXT_3scB6dHGJQmeiGBuSozBQuqEQSlwjJU010tI1MU2_vf3VfbLVTenvZLN6_Q0HKNdV-Q8_N_4BnJVAhw
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Runtime+Verification&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2022-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783031171956&rft.issn=0302-9743&rft.eissn=1611-3349&rft.volume=13498&rft_id=info:doi/10.1007%2F978-3-031-17196-3&rft.externalDocID=527386
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97830311%2F9783031171963.jpg
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-3-031-17196-3