SlideShare ist ein Scribd-Unternehmen logo
1 von 11
• Anum Ameer
• Sulman Ahmad
• Hina Qayyum
Journal of logic and Algebraic
Programming
The Brief account
of runtime
verification
1.Introduction
• Paper is about Run time Verification.
• Software and Software System are increasing day by day.
• software is an important part of consumer devices such as mobile phones
or digital cameras, and functions as embedded control devices in cars or in
power plants.
• Embedded system use .
• deployed software works in a correct, secure, and reliable manner, as life
may depend on it
• Even on failure at main end your software should work properly.
Continued…..
• embedded domain, legislation and certification authorities are requiring proof of
the most critical software properties in terms of a documented verification
process.
• Contract paly an important part in Verification
- two party agree at same condition and start working on it.
- One important aspect of verification is then to check whether
each party acts according to the contract they have agreed on.
Types
There are 3 types of verification:
 Theorem Proving
- Manually checking, show correctness of program (proof
Mathematically).
Model Checking
- Automatic Verification.
- Finite System.
Testing
-Diverse Field
- ad hoc , incomplete methods
- Correctness , precisely finding bugs
2.Run Time Verification
‘Runtime verification is the discipline of computer science that deals
with the study, development, and application of those verification
techniques that allow checking whether a run of a system under
scrutiny satisfies or violates a given correctness property.’
- Light weight
- -on runtime, incorrect behavior identify
• Failure :
current behaviour != expected behaviour
RUNTIME VERIFICATION
•Continue…….
•Monitors
•Runtime Verification Vs
Model Checking
• Runtime Verification Vs Testing
FUTURE OF
RUN TIME
VERIFICATION
Continue……
• In Application, In huge systems, certain (hardware) components may fail now and then. Using monitors to check the
expected behavior, such a fault may be observed and reported. Additional code for mitigation may then react to the fault, for
example, by displaying a corresponding error message.
• Approaches to react at runtime, 1. FDIR, which stands for Fault FDIR is that a failure within a system shows up by
a fault. A fault, however, does typically not identify the failure: for example, that it uses an old version of a
protocol. If this is identified as the failure, reconfiguration may switch the server to work.
• 2. Runtime reflection, Monitor-based runtime reflection (RR) is an architecture pattern for the development
of reliable systems. The main idea is that a monitoring layer is enriched with a diagnosis layer . We only show
the pattern with respect to information flow in a conceptual manner. Architecture consist of four layer, logging-
recording of system events, Monitoring—fault detection, Diagnosis—failure identification, Mitigation—
reconfiguration
• Monitor-oriented programming, is software development methodology. In which the developer specifies
desired properties using a variety of specification formalisms, along with code to execute, MOP aims at a
programming methodology, This implies that MOP support has to be tight to a programming language, for
example Java resulting in jMOP, while in RR, a program’s structure should highlight that it follows the RR pattern.
Conclusion:
• we presented the gist of rutime verification. Moreover, we have learned that
runtime verification has its roots in model checking
• In a certain sense, runtime verification is an old story: monitoring, software-
fault analysis
• The name changed with the technology shifts in computer science—but the
general idea prevailed and proved to be successful. Currently, the focus on
dependable and embedded systems together with the background provided by
progress in the broader field of formal methods, especially model checking, are
fertilizing the development of runtime verification techniques
• Moreover, the emerging paradigms of service oriented architectures, adaptive
and self-healing systems, and the use of electronic contracts ask for monitoring
executions of the respective systems/contracts and subsequent reaction in case
of misbehavior, as these systems hard to analyze. Especially for these
applications, runtime verification techniques form a powerful basis.

Weitere ähnliche Inhalte

Was ist angesagt?

Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20
koolkampus
 
Software requirement verification & validation
Software requirement verification & validationSoftware requirement verification & validation
Software requirement verification & validation
Abdul Basit
 

Was ist angesagt? (20)

System testing
System testingSystem testing
System testing
 
Different Software Testing Types and CMM Standard
Different Software Testing Types and CMM StandardDifferent Software Testing Types and CMM Standard
Different Software Testing Types and CMM Standard
 
Software testing
Software testingSoftware testing
Software testing
 
Ch15 software reliability
Ch15 software reliabilityCh15 software reliability
Ch15 software reliability
 
Successive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular ApproachSuccessive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular Approach
 
Software maintenance
Software maintenanceSoftware maintenance
Software maintenance
 
Software engineering 14 software quality metrics
Software engineering 14 software quality metricsSoftware engineering 14 software quality metrics
Software engineering 14 software quality metrics
 
Software testing
Software testingSoftware testing
Software testing
 
Introduction to Non Functional Requirement (NFR)
Introduction to Non Functional Requirement (NFR)Introduction to Non Functional Requirement (NFR)
Introduction to Non Functional Requirement (NFR)
 
Software testing strategies And its types
Software testing  strategies And its typesSoftware testing  strategies And its types
Software testing strategies And its types
 
What is Software Testing Lifecycle?
What is Software Testing Lifecycle? What is Software Testing Lifecycle?
What is Software Testing Lifecycle?
 
System testing
System testingSystem testing
System testing
 
Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20
 
Software engineering 23 software reliability
Software engineering 23 software reliabilitySoftware engineering 23 software reliability
Software engineering 23 software reliability
 
Installation testing
Installation testingInstallation testing
Installation testing
 
Himanshu
HimanshuHimanshu
Himanshu
 
Reliability and its principals
Reliability and its principalsReliability and its principals
Reliability and its principals
 
Software requirement verification & validation
Software requirement verification & validationSoftware requirement verification & validation
Software requirement verification & validation
 
Software Reliability
Software ReliabilitySoftware Reliability
Software Reliability
 
Availability tactics
Availability tacticsAvailability tactics
Availability tactics
 

Ähnlich wie Run time Verification using formal methods

Ähnlich wie Run time Verification using formal methods (20)

6. oose testing
6. oose testing6. oose testing
6. oose testing
 
Testing throughout the software life cycle - Testing & Implementation
Testing throughout the software life cycle - Testing & ImplementationTesting throughout the software life cycle - Testing & Implementation
Testing throughout the software life cycle - Testing & Implementation
 
Ncerc rlmca202 adm m4 ssm
Ncerc rlmca202 adm m4 ssmNcerc rlmca202 adm m4 ssm
Ncerc rlmca202 adm m4 ssm
 
The Fundamentals of VR Testing_caliidad infotech_April 2022.pptx
The Fundamentals of VR Testing_caliidad infotech_April 2022.pptxThe Fundamentals of VR Testing_caliidad infotech_April 2022.pptx
The Fundamentals of VR Testing_caliidad infotech_April 2022.pptx
 
Object oriented testing
Object oriented testingObject oriented testing
Object oriented testing
 
SDLCTesting
SDLCTestingSDLCTesting
SDLCTesting
 
When Medical Device Software Fails Due to Improper Verification & Validation ...
When Medical Device Software Fails Due to Improper Verification & Validation ...When Medical Device Software Fails Due to Improper Verification & Validation ...
When Medical Device Software Fails Due to Improper Verification & Validation ...
 
Performance testing
Performance testingPerformance testing
Performance testing
 
SQA PPT by students of tybsc.it 2023--24
SQA PPT by students of tybsc.it 2023--24SQA PPT by students of tybsc.it 2023--24
SQA PPT by students of tybsc.it 2023--24
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
Softwarequalityassurance with Abu ul hassan Sahadvi
Softwarequalityassurance with Abu ul hassan SahadviSoftwarequalityassurance with Abu ul hassan Sahadvi
Softwarequalityassurance with Abu ul hassan Sahadvi
 
unit-2_20-july-2018 (1).pptx
unit-2_20-july-2018 (1).pptxunit-2_20-july-2018 (1).pptx
unit-2_20-july-2018 (1).pptx
 
Software Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptxSoftware Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptx
 
Object Oriented Testing(OOT) presentation slides
Object Oriented Testing(OOT) presentation slidesObject Oriented Testing(OOT) presentation slides
Object Oriented Testing(OOT) presentation slides
 
Software testing introduction
Software testing  introductionSoftware testing  introduction
Software testing introduction
 
Software validation do's and dont's may 2013
Software validation do's and dont's may 2013Software validation do's and dont's may 2013
Software validation do's and dont's may 2013
 
Glimpse and Benefits of Testing
Glimpse and Benefits of TestingGlimpse and Benefits of Testing
Glimpse and Benefits of Testing
 
Ch22
Ch22Ch22
Ch22
 
HP Software Testing project (Advanced)
HP Software Testing project (Advanced)HP Software Testing project (Advanced)
HP Software Testing project (Advanced)
 

Mehr von Sulman Ahmed

Data mining Basics and complete description onword
Data mining Basics and complete description onwordData mining Basics and complete description onword
Data mining Basics and complete description onword
Sulman Ahmed
 

Mehr von Sulman Ahmed (20)

Entrepreneurial Strategy Generating and Exploiting new entries
Entrepreneurial Strategy Generating and Exploiting new entriesEntrepreneurial Strategy Generating and Exploiting new entries
Entrepreneurial Strategy Generating and Exploiting new entries
 
Entrepreneurial Intentions and corporate entrepreneurship
Entrepreneurial Intentions and corporate entrepreneurshipEntrepreneurial Intentions and corporate entrepreneurship
Entrepreneurial Intentions and corporate entrepreneurship
 
Entrepreneurship main concepts and description
Entrepreneurship main concepts and descriptionEntrepreneurship main concepts and description
Entrepreneurship main concepts and description
 
Use of Formal Methods at Amazon Web Services
Use of Formal Methods at Amazon Web ServicesUse of Formal Methods at Amazon Web Services
Use of Formal Methods at Amazon Web Services
 
student learning App
student learning Appstudent learning App
student learning App
 
Software Engineering Economics Life Cycle.
Software Engineering Economics  Life Cycle.Software Engineering Economics  Life Cycle.
Software Engineering Economics Life Cycle.
 
Data mining Techniques
Data mining TechniquesData mining Techniques
Data mining Techniques
 
Rules of data mining
Rules of data miningRules of data mining
Rules of data mining
 
Rules of data mining
Rules of data miningRules of data mining
Rules of data mining
 
Classification in data mining
Classification in data mining Classification in data mining
Classification in data mining
 
Data mining Basics and complete description
Data mining Basics and complete description Data mining Basics and complete description
Data mining Basics and complete description
 
Data mining Basics and complete description onword
Data mining Basics and complete description onwordData mining Basics and complete description onword
Data mining Basics and complete description onword
 
Dwh lecture-07-denormalization
Dwh lecture-07-denormalizationDwh lecture-07-denormalization
Dwh lecture-07-denormalization
 
Dwh lecture-06-normalization
Dwh lecture-06-normalizationDwh lecture-06-normalization
Dwh lecture-06-normalization
 
Dwh lecture 12-dm
Dwh lecture 12-dmDwh lecture 12-dm
Dwh lecture 12-dm
 
Dwh lecture 13-process dm
Dwh  lecture 13-process dmDwh  lecture 13-process dm
Dwh lecture 13-process dm
 
Dwh lecture 11-molap
Dwh  lecture 11-molapDwh  lecture 11-molap
Dwh lecture 11-molap
 
Dwh lecture 10-olap
Dwh   lecture 10-olapDwh   lecture 10-olap
Dwh lecture 10-olap
 
Dwh lecture 08-denormalization tech
Dwh   lecture 08-denormalization techDwh   lecture 08-denormalization tech
Dwh lecture 08-denormalization tech
 
Dwh lecture 07-denormalization
Dwh   lecture 07-denormalizationDwh   lecture 07-denormalization
Dwh lecture 07-denormalization
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 

Run time Verification using formal methods

  • 1. • Anum Ameer • Sulman Ahmad • Hina Qayyum
  • 2. Journal of logic and Algebraic Programming The Brief account of runtime verification
  • 3. 1.Introduction • Paper is about Run time Verification. • Software and Software System are increasing day by day. • software is an important part of consumer devices such as mobile phones or digital cameras, and functions as embedded control devices in cars or in power plants. • Embedded system use . • deployed software works in a correct, secure, and reliable manner, as life may depend on it • Even on failure at main end your software should work properly.
  • 4. Continued….. • embedded domain, legislation and certification authorities are requiring proof of the most critical software properties in terms of a documented verification process. • Contract paly an important part in Verification - two party agree at same condition and start working on it. - One important aspect of verification is then to check whether each party acts according to the contract they have agreed on.
  • 5. Types There are 3 types of verification:  Theorem Proving - Manually checking, show correctness of program (proof Mathematically). Model Checking - Automatic Verification. - Finite System. Testing -Diverse Field - ad hoc , incomplete methods - Correctness , precisely finding bugs
  • 6. 2.Run Time Verification ‘Runtime verification is the discipline of computer science that deals with the study, development, and application of those verification techniques that allow checking whether a run of a system under scrutiny satisfies or violates a given correctness property.’ - Light weight - -on runtime, incorrect behavior identify • Failure : current behaviour != expected behaviour
  • 8. •Continue……. •Monitors •Runtime Verification Vs Model Checking • Runtime Verification Vs Testing
  • 10. Continue…… • In Application, In huge systems, certain (hardware) components may fail now and then. Using monitors to check the expected behavior, such a fault may be observed and reported. Additional code for mitigation may then react to the fault, for example, by displaying a corresponding error message. • Approaches to react at runtime, 1. FDIR, which stands for Fault FDIR is that a failure within a system shows up by a fault. A fault, however, does typically not identify the failure: for example, that it uses an old version of a protocol. If this is identified as the failure, reconfiguration may switch the server to work. • 2. Runtime reflection, Monitor-based runtime reflection (RR) is an architecture pattern for the development of reliable systems. The main idea is that a monitoring layer is enriched with a diagnosis layer . We only show the pattern with respect to information flow in a conceptual manner. Architecture consist of four layer, logging- recording of system events, Monitoring—fault detection, Diagnosis—failure identification, Mitigation— reconfiguration • Monitor-oriented programming, is software development methodology. In which the developer specifies desired properties using a variety of specification formalisms, along with code to execute, MOP aims at a programming methodology, This implies that MOP support has to be tight to a programming language, for example Java resulting in jMOP, while in RR, a program’s structure should highlight that it follows the RR pattern.
  • 11. Conclusion: • we presented the gist of rutime verification. Moreover, we have learned that runtime verification has its roots in model checking • In a certain sense, runtime verification is an old story: monitoring, software- fault analysis • The name changed with the technology shifts in computer science—but the general idea prevailed and proved to be successful. Currently, the focus on dependable and embedded systems together with the background provided by progress in the broader field of formal methods, especially model checking, are fertilizing the development of runtime verification techniques • Moreover, the emerging paradigms of service oriented architectures, adaptive and self-healing systems, and the use of electronic contracts ask for monitoring executions of the respective systems/contracts and subsequent reaction in case of misbehavior, as these systems hard to analyze. Especially for these applications, runtime verification techniques form a powerful basis.