A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Kalpa Publications in Computing On the Evaluation and Comparison of Runtime Verification Tools for Hardware and Cyber-Physical Systems *
unpublished
The goal of this position paper is to fuel the discussion of ways to improve how we evaluate and compare tools for runtime verification, particularly for cyber-physical systems. ...
How do we know our runtime verdicts are correct? How do the answers to these questions change for software, hardware, or cyber-physical systems (CPS)? ...
For purposes of evaluation and comparison of RV tools that analyze hardware or cyber-physical systems, the distinction between online and offline monitoring can be made by how execution time is weighted ...
fatcat:ntv6b74ipfbbjoivc5eosnjap4
A Survey on Testing for Cyber Physical System
[chapter]
2015
Lecture Notes in Computer Science
Cyber Physical Systems (CPS) bridge the cyber-world of computing and communications with the physical world and require development of secure and reliable software. ...
It asserts a big challenge not only on testing and verifying the correctness of all physical and cyber components of such big systems, but also on integration of these components. ...
Acknowledgments This research is supported by Swedish Foundation for Strategic Research (SSF) via the SYNOPSIS Project. ...
doi:10.1007/978-3-319-25945-1_12
fatcat:bd5dopncpnaudmvkyefgxxbym4
COST Action IC1402 Runtime Verification Beyond Monitoring
[chapter]
2018
Lecture Notes in Computer Science
In this paper we report on COST Action IC1402 which studies Runtime Verification approaches beyond Monitoring. ...
COST Actions are funded by the European Union and are an efficient networking instrument for researchers, engineers and scholars to cooperate and coordinate research activities. ...
The challenges are exposed in the report of WG1 and in some chapters of the tutorial book, notably those on monitoring with data [25] and monitoring cyber-physical systems [2] . ...
doi:10.1007/978-3-030-03769-7_2
fatcat:5ephf6bopndidoywqzddmw27nq
Runtime Integrity for Cyber-Physical Infrastructures
[chapter]
2015
IFIP Advances in Information and Communication Technology
Cyber-physical systems integrate cyber capabilities (e.g., communications and computing) with physical devices (e.g., sensors, actuators and control processing units). ...
This chapter proposes a dynamic framework that addresses runtime integrity threats that target software programs in cyber-physical systems. ...
Acknowledgement This research was partially supported by the National Science Foundation under Grant Nos. DUE 1241525, CNS 1347113 and DGE 1538850. ...
doi:10.1007/978-3-319-26567-4_10
fatcat:igu4nujm7ngltgzsewvy4dpeiq
Hardware-Based Runtime Verification with Embedded Tracing Units and Stream Processing
[chapter]
2018
Lecture Notes in Computer Science
We further give an introduction to the temporal stream-based specification language TeSSLa and show how it can be used to specify typical constraints of a cyber-physical system from the railway domain. ...
We describe how these compressed traces can be used to reconstruct the actual control flow trace executed by the program running on the processor and to carry out analyses on the control flow trace in ...
Introduction Software for embedded, hybrid and cyber-physical systems often operates under tight time and resource constraints. ...
doi:10.1007/978-3-030-03769-7_5
fatcat:bxgfjsyzpfbpfksid3gu54kfxq
Real-Time Simulation in Real-Time Systems: Current Status, Research Challenges and A Way Forward
[article]
2019
arXiv
pre-print
This chapter describes the definition and importance of real-time simulation for real-time systems. ...
Simulation especially real-time simulation have been widely used for the design and testing of real-time systems. ...
On the other hand, runtime verification where properties are formally specified and checked at runtime, receives a lot of attention to verify real-time systems. ...
arXiv:1905.01848v1
fatcat:scv67aaspbc45l55ujgisaomci
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems
[article]
2019
arXiv
pre-print
Our prototype on Raspberry Pi incurs a low overhead, taking 0.0001s for each state transition integrity checking, and 0.063s~0.211s for the cyber-physical contextual consistency checking. ...
We first present a general method for reasoning cyber-physical execution semantics of a control program (i.e., causal dependencies between the physical context and program control flows), including the ...
verification.
of program behaviors from both cyber and physical domains. ...
arXiv:1805.00074v2
fatcat:x5dmz45xorgwdblfwdoqrpxiiy
COST IC1404 WG1 Deliverable WG1.2: Framework to Relate / Combine Modeling Languages and Techniques
2019
Zenodo
Ontological foundation for a framework to Relate / Combine Modeling Languages and Techniques. ...
The Glossary of Terms for Cyber-Physical Systems presented in the report on the State-of-theart on Current Formalisms used in Cyber-Physical Systems Development covered by deliverable D1.1 (78) is extracted ...
As shown in the figure, these examples employ the languages and tools listed in the report on the State-of-the-art on Current Formalisms used in Cyber-Physical Systems Development and covered by deliverable ...
doi:10.5281/zenodo.2538795
fatcat:ox2slzxzdbcrjha2xeoz75a7vy
COST Action IC 1402 ArVI: Runtime Verification Beyond Monitoring -- Activity Report of Working Group 1
[article]
2019
arXiv
pre-print
Runtime Verification is the field of research dedicated to the analysis of system executions. ...
The report aims to provide an overview of some of the major core aspects involved in Runtime Verification. ...
In 2014, we have initiated the international Competition on (Software for) Runtime Verification (CRV) [11, 36, 65, 13] with the aim to foster the comparison and evaluation of software runtime verification ...
arXiv:1902.03776v1
fatcat:2bpikbnt2bhddala2lyrztr67e
COST IC1404 WG1 Deliverable WG1.2: Framework to Relate / Combine Modeling Languages and Techniques
2019
Zenodo
Ontological foundation for a framework to Relate / Combine Modeling Languages and Techniques. ...
The Glossary of Terms for Cyber-Physical Systems presented in the report on the State-of-theart on Current Formalisms used in Cyber-Physical Systems Development covered by deliverable D1.1 (78) is extracted ...
As shown in the figure, these examples employ the languages and tools listed in the report on the State-of-the-art on Current Formalisms used in Cyber-Physical Systems Development and covered by deliverable ...
doi:10.5281/zenodo.2527577
fatcat:qsugbjnclbe4hnz46sunlqvj5a
Designing Neural Networks for Real-Time Systems
2020
IEEE Embedded Systems Letters
Artificial Neural Networks (ANNs) are increasingly being used within safety-critical Cyber-Physical Systems (CPSs). ...
They are often co-located with traditional embedded software, and may perform advisory or control-based roles. It is important to validate both the timing and functional correctness of these systems. ...
For instance, TensorFlow Lite [5] , which is one of the most popular tools used by industry to embed neural networks in cyber-physical devices, features a runtime and requires Linux to operate -and as ...
doi:10.1109/les.2020.3009910
fatcat:ede4beufonf4jc63lmpnszuhqq
Fingerprint-Based Detection and Diagnosis of Malicious Programs in Hardware
2015
IEEE Transactions on Reliability
Circuits and System in Midwest Symposium on Circuits and Systems in 2010, the Chair of the Hardware and System Security track in International Symposium on Quality Electronic Design (ISQED) in 2015, the ...
Evaluation The proposed TEA provides computation integrity verification and intermediate data protection against hardware Trojans or malicious programs. ...
doi:10.1109/tr.2015.2430471
fatcat:nihi4sidc5axhgziprzb45eahm
A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems
2019
IEEE Access
The cyber-physical systems (CPS) monitor and control the things from the distance. As a result, the concepts of dependability and security get deeply intertwined. ...
This paper summarizes state-of-the-art of existing work on anomaly detection, fault-tolerance and self-healing, and adds a number of other methods applicable to achieve resilience in an IoT. ...
systems, cyber-physical systems, and biological systems. ...
doi:10.1109/access.2019.2891969
fatcat:hb77c2cenfhlpbtpnjql5umh6a
Design and Implementation of Runtime Verification Framework for Cyber-Physical Production Systems
2019
Journal of Engineering
In this paper, we propose DigTwinOps, a Digital Twin framework for Runtime Verification of Cyber-Physical Production Systems (CPPSs). ...
In this circumstance, runtime verification of a control command is important for zero-defect manufacturing processes but challengeable because factories of the future are highly complex and heterogeneous ...
Acknowledgments A part of tools, prototypes, and methodologies of this research are provided by the ICT R&D program of MSIP/IITP (IoT-based CPS platform technology for the integration of virtual-real manufacturing ...
doi:10.1155/2019/2875236
fatcat:aort43mrlze23emgzxwqfvcbcq
A Self-Repairing Hardware Architecture for Safety-Critical Cyber-Physical-Systems
2019
IET Cyber-Physical Systems
Digital embedded systems in safety-critical cyber-physical-systems (CPSs) require high levels of resilience and robustness against different fault classes. ...
In recent years, self-healing concepts based on biological physiology have received attention for the design and implementation of reliable systems. ...
This machine is intended for the design of cyber-physical-systems where; (1) resilience to failures and fault tolerance are important, (2) efficiency in the hardware overhead is needed, and (3) flexibility ...
doi:10.1049/iet-cps.2019.0022
fatcat:xnmbz3i5zze27n3ct3f7r5yfde
« Previous
Showing results 1 — 15 out of 1,257 results