Filters








8,476 Hits in 3.7 sec

Runtime Monitoring with Union-Find Structures [chapter]

Normann Decker, Jannis Harder, Torben Scheffel, Malte Schmitz, Daniel Thoma
2016 Lecture Notes in Computer Science  
The time complexity bounds of the very efficient operations on union-find structures transfer to our monitoring algorithm: the execution time of a single monitoring step is guaranteed logarithmic in the  ...  In contrast, the proposed algorithm uses union-find data structures to manage individual instances and thereby accomplishes a significant performance improvement.  ...  Monitoring with Union-Find Structures http://www.isp.uni-luebeck.de/mufin  ... 
doi:10.1007/978-3-662-49674-9_54 fatcat:ui36oatee5bprmd6hm5cjwgh64

Runtime Monitors to Detect and Prevent Union Query Based SQL Injection Attacks

Ramya Dharam, Sajjan G. Shiva
2013 2013 10th International Conference on Information Technology: New Generations  
In this paper, we present and evaluate a framework called Runtime Monitoring Framework to handle union query based SQL Injection Attacks.  ...  These applications operate with sensitive user information and hence there is a high need for assuring their confidentiality, integrity, and availability.  ...  Runtime monitor is then developed to observe the path taken by critical variables and check them for compliance with the obtained legal paths.  ... 
doi:10.1109/itng.2013.57 dblp:conf/itng/DharamS13 fatcat:s6srlojddrdwjbwaeuonto6udq

Architectural Runtime Verification

Lars Stockmann, Sven Laux, Eric Bodden
2019 2019 IEEE International Conference on Software Architecture Companion (ICSA-C)  
From this, ARV generates a Runtime Verification monitor and applies it to runtime data stored in a database.  ...  We demonstrate the applicability of this approach with a running example from the automotive industry.  ...  Also this is in line with the RV paradigm that a monitor can be synthesized once and then applied on multiple traces that have runtime data for the involved structural elements.  ... 
doi:10.1109/icsa-c.2019.00021 dblp:conf/icsa/StockmannLB19 fatcat:a64w64hvyrau5ax6e6ejwadzyq

Static Analysis Based Invariant Detection for Commodity Operating Systems

Jinpeng Wei, Feng Zhu, Yasushi Shinjo
2011 Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing  
The recent interest in runtime attestation requires modeling of a program's runtime behavior to formulate its integrity properties.  ...  Furthermore, comparison with the result of a dynamic invariant detector reveals 17,182 variables that can cause false alarms for the dynamic detector.  ...  We also develop an invariant monitor based on the result of the static analysis and the runtime evaluation of the monitor finds only one false invariant.  ... 
doi:10.4108/icst.collaboratecom.2011.247087 dblp:conf/colcom/WeiZS11 fatcat:f32huq6sancalch3ufncidfelu

Static analysis based invariant detection for commodity operating systems

Feng Zhu, Jinpeng Wei
2014 Computers & security  
The recent interest in runtime attestation requires modeling of a program's runtime behavior to formulate its integrity properties.  ...  Furthermore, comparison with the result of a dynamic invariant detector reveals 17,182 variables that can cause false alarms for the dynamic detector.  ...  We also develop an invariant monitor based on the result of the static analysis and the runtime evaluation of the monitor finds only one false invariant.  ... 
doi:10.1016/j.cose.2014.02.008 fatcat:utc46gn6ezhsranzhbehxcf4nq

Runtime Monitoring of Software Execution Trace: Method and Tools

Shiyi Kong, Minyan Lu, Luyi Li, Lihua Gao
2020 IEEE Access  
In this paper, therefore, we propose a novel software runtime monitoring method that can help with software runtime verification and software failure prediction.  ...  Then, a runtime data-collection technique is proposed to collect runtime data exported by monitoring code.  ...  For the sake of reducing memory usage, the SRMTs use a data structure name union to store this information.  ... 
doi:10.1109/access.2020.3003087 fatcat:iqmkjhcp3jeqfojq32t2xk6yme

Worst-Case Execution Time Calculation for Query-Based Monitors by Witness Generation [article]

Márton Búr and Kristóf Marussy and Brett H. Meyer and Dániel Varró
2021 arXiv   pre-print
Runtime monitoring plays a key role in the assurance of modern intelligent cyber-physical systems, which are frequently data-intensive and safety-critical.  ...  we compare WCETs obtained with the different approaches.  ...  Our runtime monitoring framework uses a local searchbased query evaluation strategy to find matches of monitoring queries based on [50] .  ... 
arXiv:2102.03116v1 fatcat:v66xyjydrfgerpnosiztql7kq4

A Survey on Detection and Prevention Techniques of SQL Injection Attacks

Harish Dehariya, Piyush Kumar, Manish Ahirwar
2016 International Journal of Computer Applications  
The interaction between the web applications and Database is done with Structured Query Language (SQL) and Scripting Language is used.  ...  Static analysis and runtime monitoring combine in AMNESIA [30] . SQLGAURD and SQL CHECK [1] proposed a model of expected queries at runtime.  ...  Analysis module -In this module identification of hotspots done by scanning of code files and for each hotspot a model Instrument module -here each hotspot is instrument with a call to the runtime monitor  ... 
doi:10.5120/ijca2016908672 fatcat:k6tuern5irffbgla3txygr4boy

Runtime Monitoring Framework for SQL Injection Attacks

Ramya Dharam, Sajjan G. Shiva
2014 International Journal of Engineering and Technology  
In this paper, we present and evaluate Runtime Monitoring Framework to detect and prevent SQL Injection Attacks on web applications.  ...  Monitors are then developed and instrumented to observe the application's behavior and check it for compliance with the valid/legal execution paths obtained; any deviation in the application's behavior  ...  SQL-IDS incur high computation cost while comparing the new query with the predefined structure at runtime.  ... 
doi:10.7763/ijet.2014.v6.731 fatcat:kyorw26dgvf3jgrk6v34jbs76i

Using Architectural Runtime Verification for Offline Data Analysis

Lars Stockmann, Sven Laux, Eric Bodden
2021 Journal of Automotive Software Engineering  
With an ever-growing complexity of such systems, it becomes increasingly difficult to find errors that manifest at integration level, i.e., when the components interact with each other in a complex environment  ...  Architectural Runtime Verification (ARV) is an approach specifically designed for the integrator-a generic way to analyze system behavior on architecture level using the principles of Runtime Verification  ...  RV monitor paradigm applied to a database, without having to query every single event (Section 5.4) with additional findings based on further evaluation and gives a more detailed outlook.  ... 
doi:10.2991/jase.d.210205.001 fatcat:ulpu4uad2fb2tcxqmunfoggyy4

Models@Runtime: The Development and Re-Configuration Management of Python Applications Using Formal Methods

Mohammed Mounir Bouhamed, Gregorio Díaz, Allaoua Chaoui, Oussama Kamel, Radouane Nouara
2021 Applied Sciences  
Models@runtime (models at runtime) are based on computation reflection. Runtime models can be regarded as a reflexive layer causally connected with the underlying system.  ...  The proposed framework considers execution exceptions and allows users to monitor Python expressions at runtime.  ...  Union FEDER funds, ref.  ... 
doi:10.3390/app11209743 fatcat:h5mmpo7fjvbzdhgte33z7m7k44

A survey on SQL injection: Vulnerabilities, attacks, and prevention techniques

Diallo Abdoulaye Kindy, Al-Sakib Khan Pathan
2011 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE)  
Alongside presenting our findings from the survey, we also note down future expectations and possible development of countermeasures against SQL injection attacks.  ...  Dynamically-generated queries are compared with the staticallybuilt model using a runtime monitoring. SQLrand [13] A strong random integer is inserted in the SQL keywords.  ...  Union Query Injected query is joined with a safe query using the keyword UNION in order to get information related to other tables from the application.  ... 
doi:10.1109/isce.2011.5973873 fatcat:yxt6hibfqfaflllrzri6pge3we

Federated flow-based approach for privacy preserving connectivity tracking

Mentari Djatmiko, Dominik Schatzmann, Xenofontas Dimitropoulos, Arik Friedman, Roksana Boreli
2013 Proceedings of the ninth ACM conference on Emerging networking experiments and technologies - CoNEXT '13  
Network administrators are overwhelmed with large volumes of monitoring data and are limited to using very basic tools for debugging, e.g., ping and traceroute.  ...  To meet near-real-time monitoring guarantees, we then present an efficient protocol for MPC multiset union that uses counting Bloom filters (CBF) to drastically accelerate MPC comparison operations.  ...  The authors would like to acknowledge the contributions of Dilip Many and Martin Burkhart, who first developed the CBF-based multi-set union protocol in [24] before graduating for the industry.  ... 
doi:10.1145/2535372.2535388 dblp:conf/conext/DjatmikoSDFB13 fatcat:zqk3hcr7yvfnhnziwp6mejqq54

A learning optimizer for a federated database management system

Stephan Ewen, Michael Ortega-Binderberger, Volker Markl
2005 Informatik - Forschung und Entwicklung  
We present an approach that extends DB2s learning optimizer to automatically find flaws in statistics on remote data by extending its query feedback loop towards the federated architecture.  ...  The runtime monitor used with this scenario provided deferred feedback through the count(*) with CSE method.  ...  Runtime Monitor The Runtime Monitors (RM) task is to collect the actual cardinalities that correspond to the estimates recorded by the Plan Monitor.  ... 
doi:10.1007/s00450-005-0206-8 fatcat:xbq2w57pe5fq5m7gpavmdpuopu

Reusable event types for models at runtime to support the examination of runtime phenomena

Michael Szvetits, Uwe Zdun
2015 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS)  
Models help to organize knowledge and emphasize the structure of a software at a higher abstraction level.  ...  This paper proposes a collection of runtime event types that can be reused for various systems and meta-models.  ...  Thus, the set of runtime event types for an element in this category is the union of all runtime event types of its children.  ... 
doi:10.1109/models.2015.7338230 dblp:conf/models/SzvetitsZ15 fatcat:x4byw223wney5ndaica76vwmhy
« Previous Showing results 1 — 15 out of 8,476 results