SlideShare una empresa de Scribd logo
1 de 11
• Anum Ameer
• Sulman Ahmad
• Hina Qayyum
Journal of logic and Algebraic
Programming
The Brief account
of runtime
verification
1.Introduction
• Paper is about Run time Verification.
• Software and Software System are increasing day by day.
• software is an important part of consumer devices such as mobile phones
or digital cameras, and functions as embedded control devices in cars or in
power plants.
• Embedded system use .
• deployed software works in a correct, secure, and reliable manner, as life
may depend on it
• Even on failure at main end your software should work properly.
Continued…..
• embedded domain, legislation and certification authorities are requiring proof of
the most critical software properties in terms of a documented verification
process.
• Contract paly an important part in Verification
- two party agree at same condition and start working on it.
- One important aspect of verification is then to check whether
each party acts according to the contract they have agreed on.
Types
There are 3 types of verification:
 Theorem Proving
- Manually checking, show correctness of program (proof
Mathematically).
Model Checking
- Automatic Verification.
- Finite System.
Testing
-Diverse Field
- ad hoc , incomplete methods
- Correctness , precisely finding bugs
2.Run Time Verification
‘Runtime verification is the discipline of computer science that deals
with the study, development, and application of those verification
techniques that allow checking whether a run of a system under
scrutiny satisfies or violates a given correctness property.’
- Light weight
- -on runtime, incorrect behavior identify
• Failure :
current behaviour != expected behaviour
RUNTIME VERIFICATION
•Continue…….
•Monitors
•Runtime Verification Vs
Model Checking
• Runtime Verification Vs Testing
FUTURE OF
RUN TIME
VERIFICATION
Continue……
• In Application, In huge systems, certain (hardware) components may fail now and then. Using monitors to check the
expected behavior, such a fault may be observed and reported. Additional code for mitigation may then react to the fault, for
example, by displaying a corresponding error message.
• Approaches to react at runtime, 1. FDIR, which stands for Fault FDIR is that a failure within a system shows up by
a fault. A fault, however, does typically not identify the failure: for example, that it uses an old version of a
protocol. If this is identified as the failure, reconfiguration may switch the server to work.
• 2. Runtime reflection, Monitor-based runtime reflection (RR) is an architecture pattern for the development
of reliable systems. The main idea is that a monitoring layer is enriched with a diagnosis layer . We only show
the pattern with respect to information flow in a conceptual manner. Architecture consist of four layer, logging-
recording of system events, Monitoring—fault detection, Diagnosis—failure identification, Mitigation—
reconfiguration
• Monitor-oriented programming, is software development methodology. In which the developer specifies
desired properties using a variety of specification formalisms, along with code to execute, MOP aims at a
programming methodology, This implies that MOP support has to be tight to a programming language, for
example Java resulting in jMOP, while in RR, a program’s structure should highlight that it follows the RR pattern.
Conclusion:
• we presented the gist of rutime verification. Moreover, we have learned that
runtime verification has its roots in model checking
• In a certain sense, runtime verification is an old story: monitoring, software-
fault analysis
• The name changed with the technology shifts in computer science—but the
general idea prevailed and proved to be successful. Currently, the focus on
dependable and embedded systems together with the background provided by
progress in the broader field of formal methods, especially model checking, are
fertilizing the development of runtime verification techniques
• Moreover, the emerging paradigms of service oriented architectures, adaptive
and self-healing systems, and the use of electronic contracts ask for monitoring
executions of the respective systems/contracts and subsequent reaction in case
of misbehavior, as these systems hard to analyze. Especially for these
applications, runtime verification techniques form a powerful basis.

Más contenido relacionado

La actualidad más candente

Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20
koolkampus
 
Software requirement verification & validation
Software requirement verification & validationSoftware requirement verification & validation
Software requirement verification & validation
Abdul Basit
 

La actualidad más candente (20)

System testing
System testingSystem testing
System testing
 
Different Software Testing Types and CMM Standard
Different Software Testing Types and CMM StandardDifferent Software Testing Types and CMM Standard
Different Software Testing Types and CMM Standard
 
Software testing
Software testingSoftware testing
Software testing
 
Ch15 software reliability
Ch15 software reliabilityCh15 software reliability
Ch15 software reliability
 
Successive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular ApproachSuccessive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular Approach
 
Software maintenance
Software maintenanceSoftware maintenance
Software maintenance
 
Software engineering 14 software quality metrics
Software engineering 14 software quality metricsSoftware engineering 14 software quality metrics
Software engineering 14 software quality metrics
 
Software testing
Software testingSoftware testing
Software testing
 
Introduction to Non Functional Requirement (NFR)
Introduction to Non Functional Requirement (NFR)Introduction to Non Functional Requirement (NFR)
Introduction to Non Functional Requirement (NFR)
 
Software testing strategies And its types
Software testing  strategies And its typesSoftware testing  strategies And its types
Software testing strategies And its types
 
What is Software Testing Lifecycle?
What is Software Testing Lifecycle? What is Software Testing Lifecycle?
What is Software Testing Lifecycle?
 
System testing
System testingSystem testing
System testing
 
Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20
 
Software engineering 23 software reliability
Software engineering 23 software reliabilitySoftware engineering 23 software reliability
Software engineering 23 software reliability
 
Installation testing
Installation testingInstallation testing
Installation testing
 
Himanshu
HimanshuHimanshu
Himanshu
 
Reliability and its principals
Reliability and its principalsReliability and its principals
Reliability and its principals
 
Software requirement verification & validation
Software requirement verification & validationSoftware requirement verification & validation
Software requirement verification & validation
 
Software Reliability
Software ReliabilitySoftware Reliability
Software Reliability
 
Availability tactics
Availability tacticsAvailability tactics
Availability tactics
 

Similar a Run time Verification using formal methods

Similar a Run time Verification using formal methods (20)

6. oose testing
6. oose testing6. oose testing
6. oose testing
 
Testing throughout the software life cycle - Testing & Implementation
Testing throughout the software life cycle - Testing & ImplementationTesting throughout the software life cycle - Testing & Implementation
Testing throughout the software life cycle - Testing & Implementation
 
Ncerc rlmca202 adm m4 ssm
Ncerc rlmca202 adm m4 ssmNcerc rlmca202 adm m4 ssm
Ncerc rlmca202 adm m4 ssm
 
The Fundamentals of VR Testing_caliidad infotech_April 2022.pptx
The Fundamentals of VR Testing_caliidad infotech_April 2022.pptxThe Fundamentals of VR Testing_caliidad infotech_April 2022.pptx
The Fundamentals of VR Testing_caliidad infotech_April 2022.pptx
 
Object oriented testing
Object oriented testingObject oriented testing
Object oriented testing
 
SDLCTesting
SDLCTestingSDLCTesting
SDLCTesting
 
When Medical Device Software Fails Due to Improper Verification & Validation ...
When Medical Device Software Fails Due to Improper Verification & Validation ...When Medical Device Software Fails Due to Improper Verification & Validation ...
When Medical Device Software Fails Due to Improper Verification & Validation ...
 
Performance testing
Performance testingPerformance testing
Performance testing
 
SQA PPT by students of tybsc.it 2023--24
SQA PPT by students of tybsc.it 2023--24SQA PPT by students of tybsc.it 2023--24
SQA PPT by students of tybsc.it 2023--24
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
Softwarequalityassurance with Abu ul hassan Sahadvi
Softwarequalityassurance with Abu ul hassan SahadviSoftwarequalityassurance with Abu ul hassan Sahadvi
Softwarequalityassurance with Abu ul hassan Sahadvi
 
unit-2_20-july-2018 (1).pptx
unit-2_20-july-2018 (1).pptxunit-2_20-july-2018 (1).pptx
unit-2_20-july-2018 (1).pptx
 
Software Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptxSoftware Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptx
 
Object Oriented Testing(OOT) presentation slides
Object Oriented Testing(OOT) presentation slidesObject Oriented Testing(OOT) presentation slides
Object Oriented Testing(OOT) presentation slides
 
Software testing introduction
Software testing  introductionSoftware testing  introduction
Software testing introduction
 
Software validation do's and dont's may 2013
Software validation do's and dont's may 2013Software validation do's and dont's may 2013
Software validation do's and dont's may 2013
 
Glimpse and Benefits of Testing
Glimpse and Benefits of TestingGlimpse and Benefits of Testing
Glimpse and Benefits of Testing
 
Ch22
Ch22Ch22
Ch22
 
HP Software Testing project (Advanced)
HP Software Testing project (Advanced)HP Software Testing project (Advanced)
HP Software Testing project (Advanced)
 

Más de Sulman Ahmed

Data mining Basics and complete description onword
Data mining Basics and complete description onwordData mining Basics and complete description onword
Data mining Basics and complete description onword
Sulman Ahmed
 

Más de Sulman Ahmed (20)

Entrepreneurial Strategy Generating and Exploiting new entries
Entrepreneurial Strategy Generating and Exploiting new entriesEntrepreneurial Strategy Generating and Exploiting new entries
Entrepreneurial Strategy Generating and Exploiting new entries
 
Entrepreneurial Intentions and corporate entrepreneurship
Entrepreneurial Intentions and corporate entrepreneurshipEntrepreneurial Intentions and corporate entrepreneurship
Entrepreneurial Intentions and corporate entrepreneurship
 
Entrepreneurship main concepts and description
Entrepreneurship main concepts and descriptionEntrepreneurship main concepts and description
Entrepreneurship main concepts and description
 
Use of Formal Methods at Amazon Web Services
Use of Formal Methods at Amazon Web ServicesUse of Formal Methods at Amazon Web Services
Use of Formal Methods at Amazon Web Services
 
student learning App
student learning Appstudent learning App
student learning App
 
Software Engineering Economics Life Cycle.
Software Engineering Economics  Life Cycle.Software Engineering Economics  Life Cycle.
Software Engineering Economics Life Cycle.
 
Data mining Techniques
Data mining TechniquesData mining Techniques
Data mining Techniques
 
Rules of data mining
Rules of data miningRules of data mining
Rules of data mining
 
Rules of data mining
Rules of data miningRules of data mining
Rules of data mining
 
Classification in data mining
Classification in data mining Classification in data mining
Classification in data mining
 
Data mining Basics and complete description
Data mining Basics and complete description Data mining Basics and complete description
Data mining Basics and complete description
 
Data mining Basics and complete description onword
Data mining Basics and complete description onwordData mining Basics and complete description onword
Data mining Basics and complete description onword
 
Dwh lecture-07-denormalization
Dwh lecture-07-denormalizationDwh lecture-07-denormalization
Dwh lecture-07-denormalization
 
Dwh lecture-06-normalization
Dwh lecture-06-normalizationDwh lecture-06-normalization
Dwh lecture-06-normalization
 
Dwh lecture 12-dm
Dwh lecture 12-dmDwh lecture 12-dm
Dwh lecture 12-dm
 
Dwh lecture 13-process dm
Dwh  lecture 13-process dmDwh  lecture 13-process dm
Dwh lecture 13-process dm
 
Dwh lecture 11-molap
Dwh  lecture 11-molapDwh  lecture 11-molap
Dwh lecture 11-molap
 
Dwh lecture 10-olap
Dwh   lecture 10-olapDwh   lecture 10-olap
Dwh lecture 10-olap
 
Dwh lecture 08-denormalization tech
Dwh   lecture 08-denormalization techDwh   lecture 08-denormalization tech
Dwh lecture 08-denormalization tech
 
Dwh lecture 07-denormalization
Dwh   lecture 07-denormalizationDwh   lecture 07-denormalization
Dwh lecture 07-denormalization
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Run time Verification using formal methods

  • 1. • Anum Ameer • Sulman Ahmad • Hina Qayyum
  • 2. Journal of logic and Algebraic Programming The Brief account of runtime verification
  • 3. 1.Introduction • Paper is about Run time Verification. • Software and Software System are increasing day by day. • software is an important part of consumer devices such as mobile phones or digital cameras, and functions as embedded control devices in cars or in power plants. • Embedded system use . • deployed software works in a correct, secure, and reliable manner, as life may depend on it • Even on failure at main end your software should work properly.
  • 4. Continued….. • embedded domain, legislation and certification authorities are requiring proof of the most critical software properties in terms of a documented verification process. • Contract paly an important part in Verification - two party agree at same condition and start working on it. - One important aspect of verification is then to check whether each party acts according to the contract they have agreed on.
  • 5. Types There are 3 types of verification:  Theorem Proving - Manually checking, show correctness of program (proof Mathematically). Model Checking - Automatic Verification. - Finite System. Testing -Diverse Field - ad hoc , incomplete methods - Correctness , precisely finding bugs
  • 6. 2.Run Time Verification ‘Runtime verification is the discipline of computer science that deals with the study, development, and application of those verification techniques that allow checking whether a run of a system under scrutiny satisfies or violates a given correctness property.’ - Light weight - -on runtime, incorrect behavior identify • Failure : current behaviour != expected behaviour
  • 8. •Continue……. •Monitors •Runtime Verification Vs Model Checking • Runtime Verification Vs Testing
  • 10. Continue…… • In Application, In huge systems, certain (hardware) components may fail now and then. Using monitors to check the expected behavior, such a fault may be observed and reported. Additional code for mitigation may then react to the fault, for example, by displaying a corresponding error message. • Approaches to react at runtime, 1. FDIR, which stands for Fault FDIR is that a failure within a system shows up by a fault. A fault, however, does typically not identify the failure: for example, that it uses an old version of a protocol. If this is identified as the failure, reconfiguration may switch the server to work. • 2. Runtime reflection, Monitor-based runtime reflection (RR) is an architecture pattern for the development of reliable systems. The main idea is that a monitoring layer is enriched with a diagnosis layer . We only show the pattern with respect to information flow in a conceptual manner. Architecture consist of four layer, logging- recording of system events, Monitoring—fault detection, Diagnosis—failure identification, Mitigation— reconfiguration • Monitor-oriented programming, is software development methodology. In which the developer specifies desired properties using a variety of specification formalisms, along with code to execute, MOP aims at a programming methodology, This implies that MOP support has to be tight to a programming language, for example Java resulting in jMOP, while in RR, a program’s structure should highlight that it follows the RR pattern.
  • 11. Conclusion: • we presented the gist of rutime verification. Moreover, we have learned that runtime verification has its roots in model checking • In a certain sense, runtime verification is an old story: monitoring, software- fault analysis • The name changed with the technology shifts in computer science—but the general idea prevailed and proved to be successful. Currently, the focus on dependable and embedded systems together with the background provided by progress in the broader field of formal methods, especially model checking, are fertilizing the development of runtime verification techniques • Moreover, the emerging paradigms of service oriented architectures, adaptive and self-healing systems, and the use of electronic contracts ask for monitoring executions of the respective systems/contracts and subsequent reaction in case of misbehavior, as these systems hard to analyze. Especially for these applications, runtime verification techniques form a powerful basis.