Abstract
Security of social network is a serious issue that cannot be ignored. In order to improve the situation that most traditional verification methods are not real-time and too complicated, this paper proposes a runtime verification method based on source code instrumentation for social network systems. First, a property related to a social network system’s characteristics is formalized as a three-valued propositional projection temporal logic (PPTL\(_3\)) formula, and based on the formula a monitor is constructed. Then, probes are instrumented into the source code of the system, which capture events and generate the execution trace of the system. The trace is dealt with by the monitor in real-time to check whether the system satisfies or violates the desired property. To illustrate the effectiveness of this method, a case study of an open-source social network system is provided.
This research is supported by the NSFC Grant Nos. 61672403, 61272118, 61402347, 61420106004, and the Industrial Research Project of Shaanxi Province No. 2017GY-076.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20, 1–64 (2011)
Decker, N., Kuhn, F., Thoma, D.: Runtime verification of web Services for interconnected medical devices. In: IEEE International Symposium on Software Reliability Engineering, pp. 235–244. IEEE Press, New York (2014)
Zhang, S., He, F., Gu, M.: VeRV: a temporal and data-concerned verification framework for the vehicle bus systems. In: IEEE Conference on Computer Communications, pp. 1167–1175. IEEE Press, New York (2015)
Joy, M.M., Mueller, W., Rammig, F.J.: Source code annotated memory leak detection for soft real time embedded systems with resource constraints. In: IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 166–172. IEEE Press, New York (2014)
Wang, X., Liu, D., Zhao, L., Xue, Y.: Runtime verification monitor construction for three-valued PPTL. In: Liu, S., Duan, Z., Tian, C., Nagoya, F. (eds.) SOFL+MSVL 2016. LNCS, vol. 10189, pp. 144–159. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-57708-1_9
Duan, Z.: Temporal Logic and Temporal Logic Programming. Science Press, Beijing (2005)
Tian, C., Duan, Z.: Expressiveness of propositional projection temporal logic with star. Theor. Comput. Sci. 412, 1729–1744 (2011)
Duan, Z., Tian, C.: A practical decision procedure for propositional projection temporal logic with infinite models. Theor. Comput. Sci. 554, 169–190 (2014)
Zhou, S., Zedan, H., Cau, A.: Run-time analysis of time-critical systems. J. Syst. Archit. 51, 331–345 (2005)
Elkustaban, A., Moszkowski, B., Cau, A.: Specification analysis of transactional memory using ITL and AnaTempura. In: International MultiConference of Engineers and Computer Scientists, pp. 176–181. International Association of Engineers (2012)
Moszkowski, B.: Compositional reasoning using intervals and time reversal. Ann. Math. Artif. Intell. 71, 175–250 (2014)
Al Amro, S., Cau, A.: Behavioural API based virus analysis and detection. Int. J. Comput. Sci. Inf. Secur. 10, 14–22 (2012)
Jin, D., Meredith, P.O., Lee, C., Roşu, G.: JavaMOP: efficient parametric runtime monitoring framework. In: IEEE International Conference on Software Engineering, pp. 1427–1430. IEEE Press (2012)
Gabsi, W., Zalila, B., Hugues, J.: A development process for the design, implementation and code generation of fault tolerant reconfigurable real time systems. Int. J. Auton. Adapt. Commun. Syst. 9, 269–287 (2016)
Meredith, P.O., Roşu, G.: An overview of the MOP runtime verification framework. Int. J. Softw. Tools Technol. Transfer 14, 249–289 (2012)
Pardo, R., Colombo, C., Pace, G.J., Schneider, G.: An automata-based approach to evolving privacy policies for social networks. In: Falcone, Y., Sánchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 285–301. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46982-9_18
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, X., Guo, W., Zhao, L., Shu, X. (2019). Runtime Verification Method for Social Network Security Based on Source Code Instrumentation. In: Duan, Z., Liu, S., Tian, C., Nagoya, F. (eds) Structured Object-Oriented Formal Language and Method. SOFL+MSVL 2018. Lecture Notes in Computer Science(), vol 11392. Springer, Cham. https://doi.org/10.1007/978-3-030-13651-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-13651-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-13650-5
Online ISBN: 978-3-030-13651-2
eBook Packages: Computer ScienceComputer Science (R0)