Safety enforcement via programmable strategies in Maude

This work aims to provide a general mechanism for safety enforcement in rewriting logic computations. Our technique relies on an assertion-guided model transformation that leverages the newly defined Maude strategy language for ensuring rich safety policies in non-deterministic programs. The transfo...

Full description

Saved in:
Bibliographic Details
Published inJournal of logical and algebraic methods in programming Vol. 132; p. 100849
Main Authors Alpuente, M., Ballis, D., Escobar, S., Galán, D., Sapiña, J.
Format Journal Article
LanguageEnglish
Published Elsevier Inc 01.04.2023
Subjects
Online AccessGet full text
ISSN2352-2208
DOI10.1016/j.jlamp.2023.100849

Cover

Loading…
Abstract This work aims to provide a general mechanism for safety enforcement in rewriting logic computations. Our technique relies on an assertion-guided model transformation that leverages the newly defined Maude strategy language for ensuring rich safety policies in non-deterministic programs. The transformed system is guaranteed to comply with user-defined invariants that are expressed in a strategy-based, pattern-matching logic, thus preventing the concurrent system to reach any unsafe states. The performance and scalability of the technique is empirically evaluated and benchmarked on a set of realistic programs.
AbstractList This work aims to provide a general mechanism for safety enforcement in rewriting logic computations. Our technique relies on an assertion-guided model transformation that leverages the newly defined Maude strategy language for ensuring rich safety policies in non-deterministic programs. The transformed system is guaranteed to comply with user-defined invariants that are expressed in a strategy-based, pattern-matching logic, thus preventing the concurrent system to reach any unsafe states. The performance and scalability of the technique is empirically evaluated and benchmarked on a set of realistic programs.
ArticleNumber 100849
Author Ballis, D.
Sapiña, J.
Alpuente, M.
Escobar, S.
Galán, D.
Author_xml – sequence: 1
  givenname: M.
  surname: Alpuente
  fullname: Alpuente, M.
  email: alpuente@upv.es
  organization: VRAIN, Universitat Politècnica de València, Camino de Vera s/n, Apdo 22012, Valencia, 46071, Spain
– sequence: 2
  givenname: D.
  orcidid: 0000-0002-1048-1739
  surname: Ballis
  fullname: Ballis, D.
  email: demis.ballis@uniud.it
  organization: DMIF, University of Udine, Via delle Scienze, 206, Udine, 33100, Italy
– sequence: 3
  givenname: S.
  surname: Escobar
  fullname: Escobar, S.
  email: sescobar@upv.es
  organization: VRAIN, Universitat Politècnica de València, Camino de Vera s/n, Apdo 22012, Valencia, 46071, Spain
– sequence: 4
  givenname: D.
  surname: Galán
  fullname: Galán, D.
  email: dgalan@upv.es
  organization: VRAIN, Universitat Politècnica de València, Camino de Vera s/n, Apdo 22012, Valencia, 46071, Spain
– sequence: 5
  givenname: J.
  surname: Sapiña
  fullname: Sapiña, J.
  email: jsapina@upv.es
  organization: VRAIN, Universitat Politècnica de València, Camino de Vera s/n, Apdo 22012, Valencia, 46071, Spain
BookMark eNp9j8tOwzAQRb0oEqX0C9jkBxLG46RxFixQxaNSEQtgbTmTSeWoecgOlfr3pIQ1q5Gu5lzdcyMWXd-xEHcSEglyc98kzdG2Q4KAakpAp8VCLFFlGCOCvhbrEBqA6VXnWsmlyD9szeM54q7uPXHL3RidnI0G3x-8bVtbHjkKo7cjHxyHyHXRm_2u-FZc1fYYeP13V-Lr-elz-xrv319228d9TFKrMSZCypRSeSUVlDJnSSChQNqwqkkXFUrKUijtFGtE5hS1zCzWCjC1yGol1NxLvg_Bc20G71rrz0aCuSibxvwqm4uymZUn6mGmeJp2cuxNIMcdceU802iq3v3L_wAtCGNA
Cites_doi 10.1016/j.scico.2013.07.014
10.1016/j.mex.2019.10.035
10.1023/B:LISP.0000029449.57959.bd
10.1016/j.jlamp.2016.03.001
10.1016/j.scico.2009.03.003
10.1016/j.jss.2019.03.061
10.1016/0304-3975(92)90182-F
ContentType Journal Article
Copyright 2023 Elsevier Inc.
Copyright_xml – notice: 2023 Elsevier Inc.
DBID AAYXX
CITATION
DOI 10.1016/j.jlamp.2023.100849
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_jlamp_2023_100849
S2352220823000032
GrantInformation_xml – fundername: ERDF A way of making Europe
– fundername: Generalitat Valenciana
  grantid: PROMETEO/2019/098
  funderid: https://doi.org/10.13039/501100003359
– fundername: Horizon 2020
  grantid: 952215
  funderid: https://doi.org/10.13039/100010661
– fundername: MCIN/AEI/10.13039/501100011033
  grantid: PID2021-122830OB-C42
GroupedDBID --M
0R~
4.4
457
4G.
7-5
8P~
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAXUO
AAYFN
ABBOA
ABMAC
ABVKL
ABXDB
ABYKQ
ACDAQ
ACGFS
ACRLP
ADBBV
ADEZE
AEBSH
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BKOJK
BLXMC
EBS
EFJIC
EFLBG
EJD
FDB
FIRID
FYGXN
GBLVA
GBOLZ
HZ~
KOM
M41
NCXOZ
O9-
OAUVE
RIG
ROL
SPC
SPCBC
SSV
SSZ
T5K
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ACVFH
ADCNI
ADVLN
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
BNPGV
CITATION
SSH
ID FETCH-LOGICAL-c183t-cc2c53337d130b17e1c01092c6e3fc89d21c540bac01822ee42815a2f3024a2e3
IEDL.DBID AIKHN
ISSN 2352-2208
IngestDate Tue Jul 01 00:37:50 EDT 2025
Fri Feb 23 02:38:53 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Maude
Rewriting logic
Formal methods
Rewriting strategies
Program safety
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c183t-cc2c53337d130b17e1c01092c6e3fc89d21c540bac01822ee42815a2f3024a2e3
ORCID 0000-0002-1048-1739
ParticipantIDs crossref_primary_10_1016_j_jlamp_2023_100849
elsevier_sciencedirect_doi_10_1016_j_jlamp_2023_100849
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate April 2023
2023-04-00
PublicationDateYYYYMMDD 2023-04-01
PublicationDate_xml – month: 04
  year: 2023
  text: April 2023
PublicationDecade 2020
PublicationTitle Journal of logical and algebraic methods in programming
PublicationYear 2023
Publisher Elsevier Inc
Publisher_xml – name: Elsevier Inc
References Alpuente, Ballis, Frechina, Sapiña (br0130) 2016; 85
Alpuente, Cuenca-Ortega, Escobar, Meseguer (br0170) 2016; vol. 10184
Roldán, Durán, Vallecillo (br0020) 2009; 74
Alpuente, Ballis, Sapiña (br0040) 2019; 153
Alpuente, Ballis, Sapiña (br0030) 2019; 6
(br0110) 2022
TeReSe (br0050) 2003
Durán, Eker, Escobar, Martí-Oliet, Meseguer, Rubio, Talcott (br0080) 2020; 110
Logozzo, Ball (br0180) 2012
Vazou, Seidel, Jhala (br0150) 2014
Meseguer (br0060) 1992; 96
Alpuente, Ballis, Romero (br0120) 2014; 81
Jiang, Ren, Xiong, Zhang (br0090) 2019
Khoo, Shi (br0160) 2004; 17
Rubio (br0190) 2022; vol. 13252
Alpuente, Ballis, Baggi, Falaschi (br0100) 2010
Puebla, Bueno, Hermenegildo (br0140) 2000; vol. 1817
Rubio, Martí-Oliet, Pita, Verdejo (br0010) 2021; 123
Clavel, Durán, Eker, Escobar, Lincoln, Martí-Oliet, Meseguer, Rubio, Talcott (br0070) 2022
Vazou (10.1016/j.jlamp.2023.100849_br0150) 2014
Meseguer (10.1016/j.jlamp.2023.100849_br0060) 1992; 96
Logozzo (10.1016/j.jlamp.2023.100849_br0180) 2012
Alpuente (10.1016/j.jlamp.2023.100849_br0040) 2019; 153
Khoo (10.1016/j.jlamp.2023.100849_br0160) 2004; 17
Clavel (10.1016/j.jlamp.2023.100849_br0070) 2022
Rubio (10.1016/j.jlamp.2023.100849_br0190) 2022; vol. 13252
Alpuente (10.1016/j.jlamp.2023.100849_br0130) 2016; 85
Alpuente (10.1016/j.jlamp.2023.100849_br0170) 2016; vol. 10184
Alpuente (10.1016/j.jlamp.2023.100849_br0030) 2019; 6
Rubio (10.1016/j.jlamp.2023.100849_br0010) 2021; 123
Jiang (10.1016/j.jlamp.2023.100849_br0090) 2019
Alpuente (10.1016/j.jlamp.2023.100849_br0120) 2014; 81
Durán (10.1016/j.jlamp.2023.100849_br0080) 2020; 110
Roldán (10.1016/j.jlamp.2023.100849_br0020) 2009; 74
Puebla (10.1016/j.jlamp.2023.100849_br0140) 2000; vol. 1817
TeReSe (10.1016/j.jlamp.2023.100849_br0050) 2003
Alpuente (10.1016/j.jlamp.2023.100849_br0100) 2010
References_xml – start-page: 255
  year: 2019
  end-page: 266
  ident: br0090
  article-title: Inferring program transformations from singular examples via big code
  publication-title: 34th IEEE/ACM International Conference on Automated Software Engineering
– volume: 110
  year: 2020
  ident: br0080
  article-title: Programming and symbolic computation in Maude
  publication-title: J. Log. Algebraic Methods Program.
– start-page: 133
  year: 2012
  end-page: 146
  ident: br0180
  article-title: Modular and verified automatic program repair
  publication-title: Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2012)
– volume: 81
  start-page: 79
  year: 2014
  end-page: 107
  ident: br0120
  article-title: A rewriting logic approach to the formal specification and verification of web applications
  publication-title: Sci. Comput. Program.
– volume: 123
  year: 2021
  ident: br0010
  article-title: Strategies, model checking and branching-time properties in Maude
  publication-title: J. Log. Algebraic Methods Program.
– volume: vol. 10184
  start-page: 3
  year: 2016
  end-page: 20
  ident: br0170
  article-title: Partial evaluation of order-sorted equational programs modulo axioms
  publication-title: Proceedings of the 26th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2016)
– volume: vol. 13252
  start-page: 274
  year: 2022
  end-page: 294
  ident: br0190
  article-title: Maude as a library: an efficient all-purpose programming interface
  publication-title: Proceedings of the 14th International Workshop on Rewriting Logic and Its Applications
– volume: 96
  start-page: 73
  year: 1992
  end-page: 155
  ident: br0060
  article-title: Conditional rewriting logic as a unified model of concurrency
  publication-title: Theor. Comput. Sci.
– year: 2022
  ident: br0070
  article-title: Maude Manual (Version 3.2.1)
– volume: 85
  start-page: 707
  year: 2016
  end-page: 736
  ident: br0130
  article-title: Debugging Maude programs via runtime assertion checking and trace slicing
  publication-title: J. Log. Algebraic Methods Program.
– volume: vol. 1817
  start-page: 273
  year: 2000
  end-page: 292
  ident: br0140
  article-title: Combined static and dynamic assertion-based debugging of constraint logic programs
  publication-title: Proceedings of the 9th International Symposium on Logic-Based Program Synthesis and Transformation LOPSTR
– volume: 17
  start-page: 93
  year: 2004
  end-page: 128
  ident: br0160
  article-title: Program adaptation via output-constraint specialization
  publication-title: High.-Order Symb. Comput.
– volume: 74
  start-page: 812
  year: 2009
  end-page: 835
  ident: br0020
  article-title: Invariant-driven specifications in Maude
  publication-title: Sci. Comput. Program.
– volume: 6
  start-page: 2577
  year: 2019
  end-page: 2583
  ident: br0030
  article-title: Imposing assertions in Maude via program transformation
  publication-title: MethodsX
– volume: 153
  start-page: 64
  year: 2019
  end-page: 85
  ident: br0040
  article-title: Static correction of Maude programs with assertions
  publication-title: J. Syst. Softw.
– year: 2003
  ident: br0050
  article-title: Term Rewriting Systems
– start-page: 43
  year: 2010
  end-page: 52
  ident: br0100
  article-title: A fold/unfold transformation framework for rewrite theories extended to CCT
  publication-title: Proceedings of the 19th ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2010)
– year: 2022
  ident: br0110
– start-page: 39
  year: 2014
  end-page: 51
  ident: br0150
  article-title: Liquid Haskell: experience with refinement types in the real world
  publication-title: Proceedings of the 2014 ACM SIGPLAN Symposium on Haskell
– start-page: 255
  year: 2019
  ident: 10.1016/j.jlamp.2023.100849_br0090
  article-title: Inferring program transformations from singular examples via big code
– start-page: 133
  year: 2012
  ident: 10.1016/j.jlamp.2023.100849_br0180
  article-title: Modular and verified automatic program repair
– volume: 110
  year: 2020
  ident: 10.1016/j.jlamp.2023.100849_br0080
  article-title: Programming and symbolic computation in Maude
  publication-title: J. Log. Algebraic Methods Program.
– volume: 81
  start-page: 79
  year: 2014
  ident: 10.1016/j.jlamp.2023.100849_br0120
  article-title: A rewriting logic approach to the formal specification and verification of web applications
  publication-title: Sci. Comput. Program.
  doi: 10.1016/j.scico.2013.07.014
– volume: 6
  start-page: 2577
  year: 2019
  ident: 10.1016/j.jlamp.2023.100849_br0030
  article-title: Imposing assertions in Maude via program transformation
  publication-title: MethodsX
  doi: 10.1016/j.mex.2019.10.035
– volume: vol. 10184
  start-page: 3
  year: 2016
  ident: 10.1016/j.jlamp.2023.100849_br0170
  article-title: Partial evaluation of order-sorted equational programs modulo axioms
– volume: vol. 13252
  start-page: 274
  year: 2022
  ident: 10.1016/j.jlamp.2023.100849_br0190
  article-title: Maude as a library: an efficient all-purpose programming interface
– volume: 17
  start-page: 93
  issue: 1
  year: 2004
  ident: 10.1016/j.jlamp.2023.100849_br0160
  article-title: Program adaptation via output-constraint specialization
  publication-title: High.-Order Symb. Comput.
  doi: 10.1023/B:LISP.0000029449.57959.bd
– year: 2022
  ident: 10.1016/j.jlamp.2023.100849_br0070
– volume: vol. 1817
  start-page: 273
  year: 2000
  ident: 10.1016/j.jlamp.2023.100849_br0140
  article-title: Combined static and dynamic assertion-based debugging of constraint logic programs
– volume: 123
  year: 2021
  ident: 10.1016/j.jlamp.2023.100849_br0010
  article-title: Strategies, model checking and branching-time properties in Maude
  publication-title: J. Log. Algebraic Methods Program.
– start-page: 43
  year: 2010
  ident: 10.1016/j.jlamp.2023.100849_br0100
  article-title: A fold/unfold transformation framework for rewrite theories extended to CCT
– volume: 85
  start-page: 707
  year: 2016
  ident: 10.1016/j.jlamp.2023.100849_br0130
  article-title: Debugging Maude programs via runtime assertion checking and trace slicing
  publication-title: J. Log. Algebraic Methods Program.
  doi: 10.1016/j.jlamp.2016.03.001
– start-page: 39
  year: 2014
  ident: 10.1016/j.jlamp.2023.100849_br0150
  article-title: Liquid Haskell: experience with refinement types in the real world
– volume: 74
  start-page: 812
  issue: 10
  year: 2009
  ident: 10.1016/j.jlamp.2023.100849_br0020
  article-title: Invariant-driven specifications in Maude
  publication-title: Sci. Comput. Program.
  doi: 10.1016/j.scico.2009.03.003
– year: 2003
  ident: 10.1016/j.jlamp.2023.100849_br0050
– volume: 153
  start-page: 64
  year: 2019
  ident: 10.1016/j.jlamp.2023.100849_br0040
  article-title: Static correction of Maude programs with assertions
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2019.03.061
– volume: 96
  start-page: 73
  issue: 1
  year: 1992
  ident: 10.1016/j.jlamp.2023.100849_br0060
  article-title: Conditional rewriting logic as a unified model of concurrency
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/0304-3975(92)90182-F
SSID ssj0001687831
Score 2.23753
Snippet This work aims to provide a general mechanism for safety enforcement in rewriting logic computations. Our technique relies on an assertion-guided model...
SourceID crossref
elsevier
SourceType Index Database
Publisher
StartPage 100849
SubjectTerms Formal methods
Maude
Program safety
Rewriting logic
Rewriting strategies
Title Safety enforcement via programmable strategies in Maude
URI https://dx.doi.org/10.1016/j.jlamp.2023.100849
Volume 132
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NSwMxEA2lvXjxW6xf5ODRUDfpZnePpViq0l5qobeQTSawBdeiW8F_72Q3iwriweMGBsLbZN4keTNDyDUHmaVxJlmEdMaQoYCl7hZPKdY6k-TcxHWG3Gwup8vhwypedci4zYXxssrg-xufXnvrMDIIaA42RTFYcB878PqlyEf26Id7XGQSl3ZvdP84nX9dtcg0SevOhN6EeZu2_lCt9Foj9r50JRdeM5D6spq_cdQ33pnsk90QMNJRM6cD0oHykOy1zRho2JtHJFloB9UHBZ9fZOpLP_peaBoEWM8-RYq-VW1lCFqUdKa3Fo7JcnL3NJ6y0BWBGdx-FTMGARRCJBbpJ48SiIx_3uJGgnAmzSyPDIZhucZhZH8APGBEseZOIB1rDuKEdMuXEk4JtUM3tEabyOEpTOc6NSCsr7_uhANk-j65aXFQm6b4hWpVYWtVw6Y8bKqBrU9ki5X68Q8Vuue_DM_-a3hOdvxXo6S5IN3qdQuXGCRU-VVYBJ8yVbkK
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB5Ke9CLb7E-9-DRULPbPHosxZLax6Ut9LZs9gEpmBZNBf-9s8kGFcSD1w0D4Ut2vpndmW8A7qkOe3HQCz0f6cxDhtJebB4xS1HKyCilMig75KazMFl2n1fBqgGDuhfGllU631_59NJbu5WOQ7OzzbLOnNrYgZY3RTayRz_csupUQRNa_dE4mX0dtYRxFJeTCa2JZ21q_aGy0muN2FvpSspszUBsZTV_46hvvDM8ggMXMJJ-9U7H0ND5CRzWwxiI25unEM2F0cUH0ba_SJaHfuQ9E8QVYL3YFinyVtTKECTLyVTslD6D5fBpMUg8NxXBk7j9Ck9KBJAxFimkn9SPtC_t9RaVoWZGxj1FfYlhWCpwGdlfa0ww_EBQw5COBdXsHJr5JtcXQFTXdJUU0jeYhYlUxFIzZfXXDTMamb4NDzUOfFuJX_C6KmzNS9i4hY1XsLUhrLHiP74hR_f8l-Hlfw3vYC9ZTCd8MpqNr2DfPqmqaq6hWbzu9A0GDEV6636IT_bsu_A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Safety+enforcement+via+programmable+strategies+in+Maude&rft.jtitle=Journal+of+logical+and+algebraic+methods+in+programming&rft.au=Alpuente%2C+M.&rft.au=Ballis%2C+D.&rft.au=Escobar%2C+S.&rft.au=Gal%C3%A1n%2C+D.&rft.date=2023-04-01&rft.pub=Elsevier+Inc&rft.issn=2352-2208&rft.volume=132&rft_id=info:doi/10.1016%2Fj.jlamp.2023.100849&rft.externalDocID=S2352220823000032
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2352-2208&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2352-2208&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2352-2208&client=summon