Safety assurance via on-line monitoring

S. Dolev, F. Stomp

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

This paper proposes a new approach and new techniques for online monitoring of concurrent programs to ensure that some of their safety properties are not violated. The techniques modify erroneous systems which violate a certain safety property, into new systems which satisfy the safety property by adding a new layer that controls the scheduling of steps in the system. We formally characterize the relationship between the erroneous and the new system. Safety monitors for mutual-exclusion, l-exclusion, and the producer consumer tasks are presented. A proof for the mutual-exclusion task is presented to demonstrate the applicability of our approach. Our results are also of significance in the context of evolving systems, systems which are repeatedly modified due to changes in the user requirements, user specifications, or implementation. The monitoring technique proposed ensures that safety requirements are not violated in such evolving systems, in spite of frequent changes.

Original languageEnglish
Title of host publicationProceedings - 5th International Symposium on Autonomous Decentralized Systems, ISADS 2001
PublisherInstitute of Electrical and Electronics Engineers
Pages101-108
Number of pages8
ISBN (Electronic)0769510655, 9780769510651
DOIs
StatePublished - 1 Jan 2001
Event5th International Symposium on Autonomous Decentralized Systems, ISADS 2001 - Dallas, United States
Duration: 26 Mar 200128 Mar 2001

Publication series

NameProceedings - 5th International Symposium on Autonomous Decentralized Systems, ISADS 2001

Conference

Conference5th International Symposium on Autonomous Decentralized Systems, ISADS 2001
Country/TerritoryUnited States
CityDallas
Period26/03/0128/03/01

ASJC Scopus subject areas

  • Business, Management and Accounting (miscellaneous)
  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Safety assurance via on-line monitoring'. Together they form a unique fingerprint.

Cite this