Skip to main content

Compensation-Aware Runtime Monitoring

  • Conference paper
Runtime Verification (RV 2010)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6418))

Included in the following conference series:

Abstract

To avoid large overheads induced by runtime monitoring, the use of asynchronous log-based monitoring is sometimes adopted — even though this implies that the system may proceed further despite having reached an anomalous state. Any actions performed by the system after the error occurring are undesirable, since for instance, an unchecked malicious user may perform unauthorized actions. Since stopping such actions is not feasible, in this paper we investigate the use of compensations to enable the undoing of actions, thus enriching asynchronous monitoring with the ability to restore the system to the original state in which the anomaly occurred. Furthermore, we show how allowing the monitor to adaptively synchronise and desynchronise with the system is also possible and report on the use of the approach on an industrial case study of a financial transaction system.

The research work disclosed in this publication is partially funded by the Malta National Research and Innovation (R&I) Programme 2008 project number 052.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Andrews, J.H., Zhang, Y.: General test result checking with log file analysis. IEEE Trans. Softw. Eng. 29(7), 634–648 (2003)

    Article  Google Scholar 

  2. Barringer, H., Groce, A., Havelund, K., Smith, M.: An entry point for formal methods: Specification and analysis of event logs. In: Formal Methods in Aerospace, FMA (2009)

    Google Scholar 

  3. Bruni, R., Melgratti, H., Montanari, U.: Theoretical foundations for compensations in flow composition languages. In: POPL 2005: Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 209–220 (2005)

    Google Scholar 

  4. Butler, M.J., Ferreira, C.: An operational semantics for stac, a language for modelling long-running business transactions. In: De Nicola, R., Ferrari, G.-L., Meredith, G. (eds.) COORDINATION 2004. LNCS, vol. 2949, pp. 87–104. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Butler, M.J., Hoare, C.A.R., Ferreira, C.: A trace semantics for long-running transactions. In: 25 Years Communicating Sequential Processes, pp. 133–150 (2004)

    Google Scholar 

  6. Caires, L., Ferreira, C., Vieira, H.T.: A process calculus analysis of compensations. In: Kaklamanis, C., Nielson, F. (eds.) TGC 2008. LNCS, vol. 5474, pp. 87–103. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Chang, F., Ren, J.: Validating system properties exhibited in execution traces. In: Automated Software Engineering (ASE), pp. 517–520. ACM, New York (2007)

    Google Scholar 

  8. Colombo, C., Pace, G.J., Schneider, G.: Dynamic event-based runtime monitoring of real-time and contextual properties. In: Cofer, D., Fantechi, A. (eds.) FMICS 2008. LNCS, vol. 5596, pp. 135–149. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Colombo, C., Pace, G.J., Schneider, G.: Larva — safer monitoring of real-time java programs (tool paper). In: Software Engineering and Formal Methods (SEFM), pp. 33–37. IEEE Computer Society, Los Alamitos (2009)

    Google Scholar 

  10. Cronin, E., Kurc, A., Filstrup, B., Jamin, S.: An efficient synchronization mechanism for mirrored game architectures. Multimedia Tools Appl. 23(1) (2004)

    Google Scholar 

  11. D’Angelo, B., Sankaranarayanan, S., Sánchez, C., Robinson, W., Finkbeiner, B., Sipma, H.B., Mehrotra, S., Manna, Z.: Lola: Runtime monitoring of synchronous systems. In: Temporal Representation and Reasoning (TIME 2005). IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  12. Ezust, S.A., Bochmann, G.V.: An automatic trace analysis tool generator for estelle specifications. In: Applications, technologies, architectures, and protocols for computer communication (SIGCOMM), pp. 175–184 (1995)

    Google Scholar 

  13. Garcia-Molina, H., Salem, K.: Sagas. In: SIGMOD 1987: Proceedings of the 1987 ACM SIGMOD international conference on Management of data, pp. 249–259 (1987)

    Google Scholar 

  14. Gray, J.: The transaction concept: Virtues and limitations (invited paper). In: Proceedings of 7th International Conference on Very Large Data Bases, Cannes, France, September 9-11, pp. 144–154 (1981)

    Google Scholar 

  15. Guidi, C., Lucchi, R., Gorrieri, R., Busi, N., Zavattaro, G.: SOCK: A calculus for service oriented computing. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol. 4294, pp. 327–338. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Havelund, K., Roşu, G.: Synthesizing monitors for safety properties. In: Katoen, J.-P., Stevens, P. (eds.) TACAS 2002. LNCS, vol. 2280, p. 342. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  17. Jefferson, D.: Virtual time. In: International Conference on Parallel Processing (ICPP), pp. 384–394. IEEE Computer Society, Los Alamitos (1983)

    Google Scholar 

  18. Mauve, M., Vogel, J., Hilt, V., Effelsberg, W.: Local-lag and timewarp: consistency for replicated continuous applications. IEEE Transactions on Multimedia 6(1), 47–57 (2004)

    Article  Google Scholar 

  19. Roşu, G., Havelund, K.: Synthesizing dynamic programming algorithms from linear temporal logic formulae. Technical report, RIACS (2001)

    Google Scholar 

  20. Roşu, G., Havelund, K.: Rewriting-based techniques for runtime verification. Automated Software Eng. 12(2), 151–197 (2005)

    Article  Google Scholar 

  21. Vaz, C., Ferreira, C., Ravara, A.: Dynamic recovering of long running transactions. In: Kaklamanis, C., Nielson, F. (eds.) TGC 2008. LNCS, vol. 5474, pp. 201–215. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Colombo, C., Pace, G.J., Abela, P. (2010). Compensation-Aware Runtime Monitoring. In: Barringer, H., et al. Runtime Verification. RV 2010. Lecture Notes in Computer Science, vol 6418. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16612-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16612-9_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16611-2

  • Online ISBN: 978-3-642-16612-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics