A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Runtime Monitoring with Union-Find Structures
[chapter]
2016
Lecture Notes in Computer Science
The time complexity bounds of the very efficient operations on union-find structures transfer to our monitoring algorithm: the execution time of a single monitoring step is guaranteed logarithmic in the ...
In contrast, the proposed algorithm uses union-find data structures to manage individual instances and thereby accomplishes a significant performance improvement. ...
Monitoring with Union-Find Structures
http://www.isp.uni-luebeck.de/mufin ...
doi:10.1007/978-3-662-49674-9_54
fatcat:ui36oatee5bprmd6hm5cjwgh64
Runtime Monitors to Detect and Prevent Union Query Based SQL Injection Attacks
2013
2013 10th International Conference on Information Technology: New Generations
In this paper, we present and evaluate a framework called Runtime Monitoring Framework to handle union query based SQL Injection Attacks. ...
These applications operate with sensitive user information and hence there is a high need for assuring their confidentiality, integrity, and availability. ...
Runtime monitor is then developed to observe the path taken by critical variables and check them for compliance with the obtained legal paths. ...
doi:10.1109/itng.2013.57
dblp:conf/itng/DharamS13
fatcat:s6srlojddrdwjbwaeuonto6udq
Architectural Runtime Verification
2019
2019 IEEE International Conference on Software Architecture Companion (ICSA-C)
From this, ARV generates a Runtime Verification monitor and applies it to runtime data stored in a database. ...
We demonstrate the applicability of this approach with a running example from the automotive industry. ...
Also this is in line with the RV paradigm that a monitor can be synthesized once and then applied on multiple traces that have runtime data for the involved structural elements. ...
doi:10.1109/icsa-c.2019.00021
dblp:conf/icsa/StockmannLB19
fatcat:a64w64hvyrau5ax6e6ejwadzyq
Static Analysis Based Invariant Detection for Commodity Operating Systems
2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing
The recent interest in runtime attestation requires modeling of a program's runtime behavior to formulate its integrity properties. ...
Furthermore, comparison with the result of a dynamic invariant detector reveals 17,182 variables that can cause false alarms for the dynamic detector. ...
We also develop an invariant monitor based on the result of the static analysis and the runtime evaluation of the monitor finds only one false invariant. ...
doi:10.4108/icst.collaboratecom.2011.247087
dblp:conf/colcom/WeiZS11
fatcat:f32huq6sancalch3ufncidfelu
Static analysis based invariant detection for commodity operating systems
2014
Computers & security
The recent interest in runtime attestation requires modeling of a program's runtime behavior to formulate its integrity properties. ...
Furthermore, comparison with the result of a dynamic invariant detector reveals 17,182 variables that can cause false alarms for the dynamic detector. ...
We also develop an invariant monitor based on the result of the static analysis and the runtime evaluation of the monitor finds only one false invariant. ...
doi:10.1016/j.cose.2014.02.008
fatcat:utc46gn6ezhsranzhbehxcf4nq
Runtime Monitoring of Software Execution Trace: Method and Tools
2020
IEEE Access
In this paper, therefore, we propose a novel software runtime monitoring method that can help with software runtime verification and software failure prediction. ...
Then, a runtime data-collection technique is proposed to collect runtime data exported by monitoring code. ...
For the sake of reducing memory usage, the SRMTs use a data structure name union to store this information. ...
doi:10.1109/access.2020.3003087
fatcat:iqmkjhcp3jeqfojq32t2xk6yme
Worst-Case Execution Time Calculation for Query-Based Monitors by Witness Generation
[article]
2021
arXiv
pre-print
Runtime monitoring plays a key role in the assurance of modern intelligent cyber-physical systems, which are frequently data-intensive and safety-critical. ...
we compare WCETs obtained with the different approaches. ...
Our runtime monitoring framework uses a local searchbased query evaluation strategy to find matches of monitoring queries based on [50] . ...
arXiv:2102.03116v1
fatcat:v66xyjydrfgerpnosiztql7kq4
A Survey on Detection and Prevention Techniques of SQL Injection Attacks
2016
International Journal of Computer Applications
The interaction between the web applications and Database is done with Structured Query Language (SQL) and Scripting Language is used. ...
Static analysis and runtime monitoring combine in AMNESIA [30] . SQLGAURD and SQL CHECK [1] proposed a model of expected queries at runtime. ...
Analysis module -In this module identification of hotspots done by scanning of code files and for each hotspot a model Instrument module -here each hotspot is instrument with a call to the runtime monitor ...
doi:10.5120/ijca2016908672
fatcat:k6tuern5irffbgla3txygr4boy
Runtime Monitoring Framework for SQL Injection Attacks
2014
International Journal of Engineering and Technology
In this paper, we present and evaluate Runtime Monitoring Framework to detect and prevent SQL Injection Attacks on web applications. ...
Monitors are then developed and instrumented to observe the application's behavior and check it for compliance with the valid/legal execution paths obtained; any deviation in the application's behavior ...
SQL-IDS incur high computation cost while comparing the new query with the predefined structure at runtime. ...
doi:10.7763/ijet.2014.v6.731
fatcat:kyorw26dgvf3jgrk6v34jbs76i
Using Architectural Runtime Verification for Offline Data Analysis
2021
Journal of Automotive Software Engineering
With an ever-growing complexity of such systems, it becomes increasingly difficult to find errors that manifest at integration level, i.e., when the components interact with each other in a complex environment ...
Architectural Runtime Verification (ARV) is an approach specifically designed for the integrator-a generic way to analyze system behavior on architecture level using the principles of Runtime Verification ...
RV monitor paradigm applied to a database, without having to query every single event (Section 5.4) with additional findings based on further evaluation and gives a more detailed outlook. ...
doi:10.2991/jase.d.210205.001
fatcat:ulpu4uad2fb2tcxqmunfoggyy4
Models@Runtime: The Development and Re-Configuration Management of Python Applications Using Formal Methods
2021
Applied Sciences
Models@runtime (models at runtime) are based on computation reflection. Runtime models can be regarded as a reflexive layer causally connected with the underlying system. ...
The proposed framework considers execution exceptions and allows users to monitor Python expressions at runtime. ...
Union FEDER funds, ref. ...
doi:10.3390/app11209743
fatcat:h5mmpo7fjvbzdhgte33z7m7k44
A survey on SQL injection: Vulnerabilities, attacks, and prevention techniques
2011
2011 IEEE 15th International Symposium on Consumer Electronics (ISCE)
Alongside presenting our findings from the survey, we also note down future expectations and possible development of countermeasures against SQL injection attacks. ...
Dynamically-generated queries are compared with the staticallybuilt model using a runtime monitoring. SQLrand [13] A strong random integer is inserted in the SQL keywords. ...
Union Query Injected query is joined with a safe query using the keyword UNION in order to get information related to other tables from the application. ...
doi:10.1109/isce.2011.5973873
fatcat:yxt6hibfqfaflllrzri6pge3we
Federated flow-based approach for privacy preserving connectivity tracking
2013
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies - CoNEXT '13
Network administrators are overwhelmed with large volumes of monitoring data and are limited to using very basic tools for debugging, e.g., ping and traceroute. ...
To meet near-real-time monitoring guarantees, we then present an efficient protocol for MPC multiset union that uses counting Bloom filters (CBF) to drastically accelerate MPC comparison operations. ...
The authors would like to acknowledge the contributions of Dilip Many and Martin Burkhart, who first developed the CBF-based multi-set union protocol in [24] before graduating for the industry. ...
doi:10.1145/2535372.2535388
dblp:conf/conext/DjatmikoSDFB13
fatcat:zqk3hcr7yvfnhnziwp6mejqq54
A learning optimizer for a federated database management system
2005
Informatik - Forschung und Entwicklung
We present an approach that extends DB2s learning optimizer to automatically find flaws in statistics on remote data by extending its query feedback loop towards the federated architecture. ...
The runtime monitor used with this scenario provided deferred feedback through the count(*) with CSE method. ...
Runtime Monitor The Runtime Monitors (RM) task is to collect the actual cardinalities that correspond to the estimates recorded by the Plan Monitor. ...
doi:10.1007/s00450-005-0206-8
fatcat:xbq2w57pe5fq5m7gpavmdpuopu
Reusable event types for models at runtime to support the examination of runtime phenomena
2015
2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS)
Models help to organize knowledge and emphasize the structure of a software at a higher abstraction level. ...
This paper proposes a collection of runtime event types that can be reused for various systems and meta-models. ...
Thus, the set of runtime event types for an element in this category is the union of all runtime event types of its children. ...
doi:10.1109/models.2015.7338230
dblp:conf/models/SzvetitsZ15
fatcat:x4byw223wney5ndaica76vwmhy
« Previous
Showing results 1 — 15 out of 8,476 results