Runtime Monitoring ofComponent Changes with     Spy@Runtime         Carlo Ghezzi         Andrea Mocci        Mario Sangior...
OPEN ENVIRONMENTApplication   Service                        2
ISSUESLack of formal       Services may changespecifications              behavior                                         ...
GOALS Recover specifications                         Detect changesand keep them updated                                   ...
GOALS Recover specifications                         Detect changesand keep them updated                 AT RUNTIME        ...
SPY@RUNTIMEDESIGN TIME           RUN TIME                             Specification                               Update Sp...
MODELS NEEDED   Protocol Behavior Model          Behavior Equivalence ModelOnly the protocol of interaction    Precise beh...
MODELS NEEDED   Protocol Behavior Model          Behavior Equivalence ModelOnly the protocol of interaction    Precise beh...
MODELS NEEDED   Protocol Behavior Model          Behavior Equivalence ModelOnly the protocol of interaction    Precise beh...
MODELS NEEDED   Protocol Behavior Model          Behavior Equivalence ModelOnly the protocol of interaction    Precise beh...
MODELS NEEDED   Protocol Behavior Model          Behavior Equivalence ModelOnly the protocol of interaction    Precise beh...
DESIGN TIME Scope               API         Dynamicselection      instrumentation   analysis                              ...
DESIGN TIME Scope                  API           Dynamicselection         instrumentation     analysis            Service ...
DESIGN TIME Scope                  API           Dynamicselection         instrumentation     analysis            Service ...
RUN TIMEApplication    Monitor   Service                                   8
VIOLATION DETECTIONExecution      Protocol  Trace     Behavior Model                             9
VIOLATION INTERPRETATION    Protocol Behavior Model                   Behavioral                  Equivalence             ...
LIVE DEMOUpdate of an incomplete model Detection of an injected fault                                  11
Upcoming SlideShare
Loading in …5
×

Runtime Monitoring of Component Changes with Spy@Runtime

2,229 views

Published on

ICSE 2012 Formal Demonstration

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,229
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Soprattutto di’ che la scope selection ha un costo inferiore o al massimo analogo alla scrittura di casi di test.\n
  • Soprattutto di’ che la scope selection ha un costo inferiore o al massimo analogo alla scrittura di casi di test.\n
  • \n
  • \n
  • Stress that BEM is used as an oracle to determine whether everything is still behaving correctly.\nExplain clearly how we use it to determine the nature of a violation\n
  • \n
  • Runtime Monitoring of Component Changes with Spy@Runtime

    1. 1. Runtime Monitoring ofComponent Changes with Spy@Runtime Carlo Ghezzi Andrea Mocci Mario Sangiorgio
    2. 2. OPEN ENVIRONMENTApplication Service 2
    3. 3. ISSUESLack of formal Services may changespecifications behavior 3
    4. 4. GOALS Recover specifications Detect changesand keep them updated 4
    5. 5. GOALS Recover specifications Detect changesand keep them updated AT RUNTIME 4
    6. 6. SPY@RUNTIMEDESIGN TIME RUN TIME Specification Update Specification Monitoring Change Detection Inference 5
    7. 7. MODELS NEEDED Protocol Behavior Model Behavior Equivalence ModelOnly the protocol of interaction Precise behavior description General validity Valid in a small scope Built via abstraction Built from an exhaustive search Monitoring Violation Interpretation 6
    8. 8. MODELS NEEDED Protocol Behavior Model Behavior Equivalence ModelOnly the protocol of interaction Precise behavior description General validity Valid in a small scope Built via abstraction Built from an exhaustive search Monitoring Violation Interpretation 6
    9. 9. MODELS NEEDED Protocol Behavior Model Behavior Equivalence ModelOnly the protocol of interaction Precise behavior description General validity Valid in a small scope Built via abstraction Built from an exhaustive search Monitoring Violation Interpretation 6
    10. 10. MODELS NEEDED Protocol Behavior Model Behavior Equivalence ModelOnly the protocol of interaction Precise behavior description General validity Valid in a small scope Built via abstraction Built from an exhaustive search Monitoring Violation Interpretation 6
    11. 11. MODELS NEEDED Protocol Behavior Model Behavior Equivalence ModelOnly the protocol of interaction Precise behavior description General validity Valid in a small scope Built via abstraction Built from an exhaustive search Monitoring Violation Interpretation 6
    12. 12. DESIGN TIME Scope API Dynamicselection instrumentation analysis 7
    13. 13. DESIGN TIME Scope API Dynamicselection instrumentation analysis Service behavior models 7
    14. 14. DESIGN TIME Scope API Dynamicselection instrumentation analysis Service behavior models 7
    15. 15. RUN TIMEApplication Monitor Service 8
    16. 16. VIOLATION DETECTIONExecution Protocol Trace Behavior Model 9
    17. 17. VIOLATION INTERPRETATION Protocol Behavior Model Behavioral Equivalence Model 10
    18. 18. LIVE DEMOUpdate of an incomplete model Detection of an injected fault 11

    ×