SlideShare a Scribd company logo
1 of 19
On Adequate Behavior-based
Architecture Conformance Checks
Ana Nicolaescu
Horst Lichter
RWTH Aachen University
Veit Hoffmann
Generali Deutschland Informatik Services
What is a Software Architecture (Description)
“fundamental concepts or properties of a system in its environment embodied in its
elements, relationships, and in the principles of its design and evolution” (ISO/IEC/IEEE 42010)
2
Logical/Static View Development View
Physical ViewProcess/Behavior View
Scenarios
Kruchten’s 4+1
Conformance Checking?
3
conformance checking = a process conducted to reveal the drift emerged between the intended
and the implemented architecture of a system
Static Conformance Checking
4
Cheap
Scalable
Tool-Supported
Complete (in its scope)
Relies on available input
Static vs. Behavior View
5
Relation Behavior View Static View
Method Invocation / Instantiation Yes Yes
Extends / Implements / Import /
Variable Access
No Yes
Multi-process / Heterogenuos
Subsystems
Yes No
Remoting (REST, Queue, ...) /
Dynamic Usage (Reflection, DI, ...)
Yes No
Execution Frequency / Time / Order Yes No
Behavior-based Conformance Checks
6
● “It is a challenge for dynamic compliance checking to select
the right system execution scenario“ (Knodel et et al., 2008)
● “A challenge faced by any dynamic program monitoring tool
is ensuring sufficient execution coverage” (De Silva and Balasubramaniam, 2013)
● The extracted architectural facts are as good as the code
coverage (Ganesan et al., 2008)
Adequacy of Behavior-based Conformance Checks
7
● Behavior-relevant rules
applied on….
● Architecturally-relevant behavior
Static vs. Behavior-based Conformance Checking
8
3
1217
ARAMIS Sonargraph
Architect
4 are in the scope of ARAMIS
ARAMIS vs. Sonargraph - number of violation types
file-systems violations
performance issues
use of external dependencies
ARAMIS
9
● ARchitectural Analysis and Monitoring InfraStructure
● Behavior-based architecture conformance checking
● Monitor & analyze communication
● Detect violations against specified
architecture rules
ARAMIS
Communication Rules in ARAMIS
10
Communication Rules in ARAMIS - Example
11
ValidatingMappingAdapting
Extracting
Implemented
Architecture
Description
Communication
Violations
ARAMIS
Workflow
Communication
Rules
Intended
Architecture
Description
Communication Rules in ARAMIS - Example
12
ValidatingMappingAdapting
Extracting
Implemented
Architecture
Description
Communication
Violations
ARAMIS
Workflow
Communication
Rules
Intended
Architecture
Description
Conformance Checking of ARAMIS
13
MappingAdapting
ValidatingMapping
Conformance Checking of ARAMIS
14
Nb. of Rules 19
Nb. of Violation Types 2
Statement Coverage 51%
Relevant Scenarios
Context VarietyScenario Coverage 75%
Adequacy of Behavior-based Conformance Checks
15
● Behavior-relevant rules
applied on….
● Architecturally-relevant behavior
The Scenario Coverage Metric
16
Second Evaluation
17
Scenario Coverage 58%
Second Evaluation
18
Scenario Coverage 88% Statement Coverage 34%
Conslusions
19
ARAMIS

More Related Content

What's hot

Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...Tim Menzies
 
Matlab Programming Assignment help , Matlab Programming Online tutors
Matlab Programming Assignment help , Matlab Programming Online tutorsMatlab Programming Assignment help , Matlab Programming Online tutors
Matlab Programming Assignment help , Matlab Programming Online tutorsjohn mayer
 
Differences asked in Software Testing Interview.
Differences asked in Software Testing Interview. Differences asked in Software Testing Interview.
Differences asked in Software Testing Interview. Siddharth Sharma
 
Fractional differential equations Assignment Help and Fractional differential...
Fractional differential equations Assignment Help and Fractional differential...Fractional differential equations Assignment Help and Fractional differential...
Fractional differential equations Assignment Help and Fractional differential...john mayer
 
Modeling Clinical Workflow
Modeling Clinical WorkflowModeling Clinical Workflow
Modeling Clinical Workflowstavery
 
UML Diagram Assignment help , UML Diagram Online tutors
UML Diagram Assignment help , UML Diagram Online tutorsUML Diagram Assignment help , UML Diagram Online tutors
UML Diagram Assignment help , UML Diagram Online tutorsjohn mayer
 
Lecture 20 software testing (2)
Lecture 20   software testing (2)Lecture 20   software testing (2)
Lecture 20 software testing (2)IIUI
 
Robustness testing
Robustness testingRobustness testing
Robustness testingCS, NcState
 
Ergonomics Assignment Help and Ergonomics Online Tutors
Ergonomics Assignment Help and Ergonomics Online TutorsErgonomics Assignment Help and Ergonomics Online Tutors
Ergonomics Assignment Help and Ergonomics Online Tutorsjohn mayer
 
Computer Network Assignment help , Computer Network Online tutors
Computer Network Assignment help , Computer Network Online tutorsComputer Network Assignment help , Computer Network Online tutors
Computer Network Assignment help , Computer Network Online tutorsjohn mayer
 
System testing
System testingSystem testing
System testingMani Kanth
 
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...Mechanical engineering drawing Assignment Help and Mechanical engineering dra...
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...john mayer
 
Computer Science Assignment help , Computer Science Online tutors
Computer Science Assignment help , Computer Science Online tutorsComputer Science Assignment help , Computer Science Online tutors
Computer Science Assignment help , Computer Science Online tutorsjohn mayer
 
Testing throughout the software life cycle
Testing throughout the software life cycleTesting throughout the software life cycle
Testing throughout the software life cycleadeafsa
 
Understanding the Rationale for Updating a Function's Comment
Understanding the Rationale for Updating a Function's CommentUnderstanding the Rationale for Updating a Function's Comment
Understanding the Rationale for Updating a Function's CommentSAIL_QU
 

What's hot (20)

System testing
System testingSystem testing
System testing
 
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
 
Income Tax Audit
Income Tax AuditIncome Tax Audit
Income Tax Audit
 
Matlab Programming Assignment help , Matlab Programming Online tutors
Matlab Programming Assignment help , Matlab Programming Online tutorsMatlab Programming Assignment help , Matlab Programming Online tutors
Matlab Programming Assignment help , Matlab Programming Online tutors
 
Differences asked in Software Testing Interview.
Differences asked in Software Testing Interview. Differences asked in Software Testing Interview.
Differences asked in Software Testing Interview.
 
Fractional differential equations Assignment Help and Fractional differential...
Fractional differential equations Assignment Help and Fractional differential...Fractional differential equations Assignment Help and Fractional differential...
Fractional differential equations Assignment Help and Fractional differential...
 
Modeling Clinical Workflow
Modeling Clinical WorkflowModeling Clinical Workflow
Modeling Clinical Workflow
 
UML Diagram Assignment help , UML Diagram Online tutors
UML Diagram Assignment help , UML Diagram Online tutorsUML Diagram Assignment help , UML Diagram Online tutors
UML Diagram Assignment help , UML Diagram Online tutors
 
Lecture 20 software testing (2)
Lecture 20   software testing (2)Lecture 20   software testing (2)
Lecture 20 software testing (2)
 
Robustness testing
Robustness testingRobustness testing
Robustness testing
 
Ergonomics Assignment Help and Ergonomics Online Tutors
Ergonomics Assignment Help and Ergonomics Online TutorsErgonomics Assignment Help and Ergonomics Online Tutors
Ergonomics Assignment Help and Ergonomics Online Tutors
 
Computer Network Assignment help , Computer Network Online tutors
Computer Network Assignment help , Computer Network Online tutorsComputer Network Assignment help , Computer Network Online tutors
Computer Network Assignment help , Computer Network Online tutors
 
System testing
System testingSystem testing
System testing
 
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...Mechanical engineering drawing Assignment Help and Mechanical engineering dra...
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...
 
Computer Science Assignment help , Computer Science Online tutors
Computer Science Assignment help , Computer Science Online tutorsComputer Science Assignment help , Computer Science Online tutors
Computer Science Assignment help , Computer Science Online tutors
 
Testing throughout the software life cycle
Testing throughout the software life cycleTesting throughout the software life cycle
Testing throughout the software life cycle
 
Silverlight
SilverlightSilverlight
Silverlight
 
Qulaity strategy template
Qulaity strategy templateQulaity strategy template
Qulaity strategy template
 
SpecTRM
SpecTRMSpecTRM
SpecTRM
 
Understanding the Rationale for Updating a Function's Comment
Understanding the Rationale for Updating a Function's CommentUnderstanding the Rationale for Updating a Function's Comment
Understanding the Rationale for Updating a Function's Comment
 

Similar to On Adequate Behavior-based Architecture Conformance Checks

Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471vconovalov
 
Enterprise performance engineering solutions
Enterprise performance engineering solutionsEnterprise performance engineering solutions
Enterprise performance engineering solutionsInfosys
 
Keynote: Elastic Observability evolution and vision
  Keynote: Elastic Observability evolution and vision  Keynote: Elastic Observability evolution and vision
Keynote: Elastic Observability evolution and visionElasticsearch
 
System requirements engineering
System requirements engineeringSystem requirements engineering
System requirements engineeringAnimesh Chaturvedi
 
What is Platform Observability? An Overview
What is Platform Observability? An OverviewWhat is Platform Observability? An Overview
What is Platform Observability? An OverviewKumar Kolaganti
 
Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...Osama M. Khaled
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...ijfcstjournal
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...Run-time Monitoring-based Evaluation and Communication Integrity Validation o...
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...Ana Nicolaescu
 
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...CREST @ University of Adelaide
 
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...IOSR Journals
 
[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architectureIvano Malavolta
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1Robert Donald
 
Chapter 3 - Analytical Techniques
Chapter 3 - Analytical TechniquesChapter 3 - Analytical Techniques
Chapter 3 - Analytical TechniquesNeeraj Kumar Singh
 
Enterprise Software Architecture styles
Enterprise Software Architecture stylesEnterprise Software Architecture styles
Enterprise Software Architecture stylesAraf Karsh Hamid
 
Analysis and Control of Computing Systems
Analysis and Control of Computing SystemsAnalysis and Control of Computing Systems
Analysis and Control of Computing Systemsnorhavillegas
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...IJCSIS Research Publications
 

Similar to On Adequate Behavior-based Architecture Conformance Checks (20)

Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471
 
Enterprise performance engineering solutions
Enterprise performance engineering solutionsEnterprise performance engineering solutions
Enterprise performance engineering solutions
 
Keynote: Elastic Observability evolution and vision
  Keynote: Elastic Observability evolution and vision  Keynote: Elastic Observability evolution and vision
Keynote: Elastic Observability evolution and vision
 
System requirements engineering
System requirements engineeringSystem requirements engineering
System requirements engineering
 
What is Platform Observability? An Overview
What is Platform Observability? An OverviewWhat is Platform Observability? An Overview
What is Platform Observability? An Overview
 
Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...Run-time Monitoring-based Evaluation and Communication Integrity Validation o...
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...
 
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
 
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
 
[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1
 
Chapter 3 - Analytical Techniques
Chapter 3 - Analytical TechniquesChapter 3 - Analytical Techniques
Chapter 3 - Analytical Techniques
 
Enterprise Software Architecture styles
Enterprise Software Architecture stylesEnterprise Software Architecture styles
Enterprise Software Architecture styles
 
Analysis and Control of Computing Systems
Analysis and Control of Computing SystemsAnalysis and Control of Computing Systems
Analysis and Control of Computing Systems
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
81-T48
81-T4881-T48
81-T48
 
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...
 
Unit 2
Unit 2Unit 2
Unit 2
 

Recently uploaded

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 

Recently uploaded (20)

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 

On Adequate Behavior-based Architecture Conformance Checks

  • 1. On Adequate Behavior-based Architecture Conformance Checks Ana Nicolaescu Horst Lichter RWTH Aachen University Veit Hoffmann Generali Deutschland Informatik Services
  • 2. What is a Software Architecture (Description) “fundamental concepts or properties of a system in its environment embodied in its elements, relationships, and in the principles of its design and evolution” (ISO/IEC/IEEE 42010) 2 Logical/Static View Development View Physical ViewProcess/Behavior View Scenarios Kruchten’s 4+1
  • 3. Conformance Checking? 3 conformance checking = a process conducted to reveal the drift emerged between the intended and the implemented architecture of a system
  • 5. Static vs. Behavior View 5 Relation Behavior View Static View Method Invocation / Instantiation Yes Yes Extends / Implements / Import / Variable Access No Yes Multi-process / Heterogenuos Subsystems Yes No Remoting (REST, Queue, ...) / Dynamic Usage (Reflection, DI, ...) Yes No Execution Frequency / Time / Order Yes No
  • 6. Behavior-based Conformance Checks 6 ● “It is a challenge for dynamic compliance checking to select the right system execution scenario“ (Knodel et et al., 2008) ● “A challenge faced by any dynamic program monitoring tool is ensuring sufficient execution coverage” (De Silva and Balasubramaniam, 2013) ● The extracted architectural facts are as good as the code coverage (Ganesan et al., 2008)
  • 7. Adequacy of Behavior-based Conformance Checks 7 ● Behavior-relevant rules applied on…. ● Architecturally-relevant behavior
  • 8. Static vs. Behavior-based Conformance Checking 8 3 1217 ARAMIS Sonargraph Architect 4 are in the scope of ARAMIS ARAMIS vs. Sonargraph - number of violation types file-systems violations performance issues use of external dependencies
  • 9. ARAMIS 9 ● ARchitectural Analysis and Monitoring InfraStructure ● Behavior-based architecture conformance checking ● Monitor & analyze communication ● Detect violations against specified architecture rules ARAMIS
  • 11. Communication Rules in ARAMIS - Example 11 ValidatingMappingAdapting Extracting Implemented Architecture Description Communication Violations ARAMIS Workflow Communication Rules Intended Architecture Description
  • 12. Communication Rules in ARAMIS - Example 12 ValidatingMappingAdapting Extracting Implemented Architecture Description Communication Violations ARAMIS Workflow Communication Rules Intended Architecture Description
  • 13. Conformance Checking of ARAMIS 13 MappingAdapting ValidatingMapping
  • 14. Conformance Checking of ARAMIS 14 Nb. of Rules 19 Nb. of Violation Types 2 Statement Coverage 51% Relevant Scenarios Context VarietyScenario Coverage 75%
  • 15. Adequacy of Behavior-based Conformance Checks 15 ● Behavior-relevant rules applied on…. ● Architecturally-relevant behavior
  • 18. Second Evaluation 18 Scenario Coverage 88% Statement Coverage 34%