Abstract
We introduce the monitoring of trace properties under assumptions. An assumption limits the space of possible traces that the monitor may encounter. An assumption may result from knowledge about the system that is being monitored, about the environment, or about another, connected monitor. We define monitorability under assumptions and study its theoretical properties. In particular, we show that for every assumption A, the boolean combinations of properties that are safe or co-safe relative to A are monitorable under A. We give several examples and constructions on how an assumption can make a non-monitorable property monitorable, and how an assumption can make a monitorable property monitorable with fewer resources, such as integer registers.
This research was supported in part by the Austrian Science Fund (FWF) under grant Z211-N23 (Wittgenstein Award).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
We follow the notation of [13] for temporal logic, where \(\mathcal {U}\) is the (strong) until operator, and \(\mathcal {W}\) is the unless (or weak until) operator.
References
Alpern, B., Schneider, F.B.: Defining liveness. Inf. Process. Lett. 21(4), 181ā185 (1985). https://doi.org/10.1016/0020-0190(85)90056-0. http://www.sciencedirect.com/science/article/pii/0020019085900560
Alpern, B., Schneider, F.B.: Recognizing safety and liveness. Distrib. Comput. 2(3), 117ā126 (1987). https://doi.org/10.1007/BF01782772
Bartocci, E., Falcone, Y., Francalanza, A., Reger, G.: Introduction to runtime verification. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 1ā33. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-75632-5_1
Bauer, A., Falcone, Y.: Decentralised LTL monitoring. In: Giannakopoulou, D., MĆ©ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 85ā100. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32759-9_10
Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20(4) (2011). https://doi.org/10.1145/2000799.2000800
Chang, E., Manna, Z., Pnueli, A.: The safety-progress classification. In: Bauer, F.L., Brauer, W., Schwichtenberg, H. (eds.) Logic and Algebra of Specification. NATO ASI Series, vol. 94, pp. 143ā202. Springer, Heidelberg (1993). https://doi.org/10.1007/978-3-642-58041-3_5
Chen, F., Serbanuta, T., Rosu, G.: Jpredictor. In: 2008 ACM/IEEE 30th International Conference on Software Engineering, pp. 221ā230 (2008). https://doi.org/10.1145/1368088.1368119
Cimatti, A., Tian, C., Tonetta, S.: Assumption-based runtime verification with partial observability and resets. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 165ā184. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32079-9_10
Diekert, V., Leucker, M.: Topology, monitorable properties and runtime verification. Theoret. Comput. Sci. 537, 29ā41 (2014). https://doi.org/10.1016/j.tcs.2014.02.052
Falcone, Y., Fernandez, J.C., Mounier, L.: What can you verify and enforce at runtime? Sotfw. Tools Technol. Transf. (2011). https://hal.archives-ouvertes.fr/hal-00497350
FerrĆØre, T., Henzinger, T.A., SaraƧ, N.E.: A theory of register monitors. In: Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, pp. 394ā403 (2018). https://doi.org/10.1145/3209108.3209194
Henzinger, T.A.: Sooner is safer than later. Inf. Process. Lett. 43(3), 135ā141 (1992). https://doi.org/10.1016/0020-0190(92)90005-G. http://www.sciencedirect.com/science/article/pii/002001909290005G
Manna, Z., Pnueli, A.: The Temporal Logic of Reactive and Concurrent Systems - Specification. Springer, Heidelberg (1992). https://doi.org/10.1007/978-1-4612-0931-7
Peled, D., Havelund, K.: Refining the safetyāliveness classification of temporal properties according to monitorability. In: Margaria, T., Graf, S., Larsen, K.G. (eds.) Models, Mindsets, Meta: The What, the How, and the Why Not?. LNCS, vol. 11200, pp. 218ā234. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22348-9_14
Petric MaretiÄ, G., Torabi Dashti, M., Basin, D.: LTL is closed under topological closure. Inf. Process. Lett. 114(8), 408ā413 (2014). https://doi.org/10.1016/j.ipl.2014.03.001. http://www.sciencedirect.com/science/article/pii/S0020019014000386
Pinisetty, S., JĆ©ron, T., Tripakis, S., Falcone, Y., Marchand, H., Preoteasa, V.: Predictive runtime verification of timed properties. J. Syst. Softw. 132, 353ā365 (2017). https://doi.org/10.1016/j.jss.2017.06.060. http://www.sciencedirect.com/science/article/pii/S0164121217301310
Pnueli, A., Zaks, A.: PSL model checking and run-time verification via testers. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol. 4085, pp. 573ā586. Springer, Heidelberg (2006). https://doi.org/10.1007/11813040_38
Zhang, X., Leucker, M., Dong, W.: Runtime verification with predictive semantics. In: Goodloe, A.E., Person, S. (eds.) NFM 2012. LNCS, vol. 7226, pp. 418ā432. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-28891-3_37
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Henzinger, T.A., SaraƧ, N.E. (2020). Monitorability Under Assumptions. In: Deshmukh, J., NiÄkoviÄ, D. (eds) Runtime Verification. RV 2020. Lecture Notes in Computer Science(), vol 12399. Springer, Cham. https://doi.org/10.1007/978-3-030-60508-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-60508-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-60507-0
Online ISBN: 978-3-030-60508-7
eBook Packages: Computer ScienceComputer Science (R0)