TY - GEN
T1 - On-line monitoring of real time applications for early error detection
AU - Robert, Thomas
AU - Fabre, Jean Charles
AU - Roy, Matthieu
PY - 2008/12/1
Y1 - 2008/12/1
N2 - Error confinement technologies have proven their efficiency to improve software dependability. Such mechanisms usually require efficient error detectors to swiftly signal any misbehaviour. Real-time systems, due to their timing constraints, require a richer description of correct and/or erroneous states that includes timing aspects. This paper presents real-time error detectors that can be automatically generated from formal models of the expected behaviours of software applications. The considered specifications provide the means to define quantitative temporal constraints on the execution of the application. These detectors check at run-time that the current execution matches its specification. The paper contribution is twofold. Firstly, at the theoretical level, we provide a formal definition of the expected behaviour of such detectors, ensuring a predictable behaviour of the detector system. Secondly, at a practical level, we provide a description of the complete generation process, from the models to the code of the detector.
AB - Error confinement technologies have proven their efficiency to improve software dependability. Such mechanisms usually require efficient error detectors to swiftly signal any misbehaviour. Real-time systems, due to their timing constraints, require a richer description of correct and/or erroneous states that includes timing aspects. This paper presents real-time error detectors that can be automatically generated from formal models of the expected behaviours of software applications. The considered specifications provide the means to define quantitative temporal constraints on the execution of the application. These detectors check at run-time that the current execution matches its specification. The paper contribution is twofold. Firstly, at the theoretical level, we provide a formal definition of the expected behaviour of such detectors, ensuring a predictable behaviour of the detector system. Secondly, at a practical level, we provide a description of the complete generation process, from the models to the code of the detector.
U2 - 10.1109/PRDC.2008.31
DO - 10.1109/PRDC.2008.31
M3 - Conference contribution
AN - SCOPUS:60349096937
SN - 9780769534480
T3 - Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008
SP - 24
EP - 31
BT - Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008
T2 - 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008
Y2 - 15 December 2008 through 17 December 2008
ER -