Skip to main content

X-by-Construction Meets Runtime Verification

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13701))

Abstract

In recent years, researchers have started to investigate X-by-Construction (XbC)—beyond correctness as considered by the more traditional Correctness-by-Construction (CbC) paradigm—as a refinement approach to engineer systems that by-construction satisfy certain non-functional properties—also, and in particular, in the setting of probabilistic systems and properties. In line with the need to join forces with concepts from runtime verification (RV), this track brings together researchers and practitioners working to share their views on the many possible synergies between CbC/XbC at design time and RV at runtime.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Abbas, H., Bonakdarpour, B.: Leveraging system dynamics in runtime verification of cyber-physical systems. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 264–278. Springer, Heidelberg (2022)

    Google Scholar 

  2. Adelt, J., Herber, P., Niehage, M., Remke, A.: Towards safe and resilient hybrid systems in the presence of learning and uncertainty. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 299–319. Springer, Heidelberg (2022)

    Google Scholar 

  3. Ahrendt, W., Gurov, D., Johansson, M., Rümmer, P.: TriCo – triple co-piloting of implementation, specification and tests. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 174–187. Springer, Heidelberg (2022)

    Google Scholar 

  4. Azzopardi, S., Piterman, N., Schneider, G.: Runtime verification meets controller synthesis. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 382–396. Springer, Heidelberg (2022)

    Google Scholar 

  5. ter Beek, M.H., Cleophas, L., Legay, A., Schaefer, I., Watson, B.W.: X-by-construction: correctness meets probability. In: Margaria, T., Steffen, B. (eds.) ISoLA 2020. LNCS, vol. 12476, pp. 211–215. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-61362-4_11

    Chapter  Google Scholar 

  6. ter Beek, M.H., Cleophas, L., Schaefer, I., Watson, B.W.: X-by-construction. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. 359–364. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03418-4_21

    Chapter  Google Scholar 

  7. ter Beek, M.H., Hähnle, R., Schaefer, I.: Correctness-by-construction and post-hoc verification: friends or foes? In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9952, pp. 723–729. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47166-2_51

    Chapter  Google Scholar 

  8. Berducci, L., Grosu, R.: Safe policy improvement in constrained Markov decision processes. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 360–381. Springer, Heidelberg (2022)

    Google Scholar 

  9. Colombo, C., et al.: COST action IC1402 runtime verification beyond monitoring. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 18–26. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03769-7_2

    Chapter  Google Scholar 

  10. Coto, A., Barbanera, F., Lanese, I., Rossi, D., Tuosto, E.: On formal choreographic modelling: a case study in EU business processes. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 205–219. Springer, Heidelberg (2022)

    Google Scholar 

  11. Dam, K.H.T., Duchêne, F., Given-Wilson, T., Cordy, M., Legay, A.: Automated repair of security errors in C programs via statistical model checking: a proof of concept. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 279–298. Springer, Heidelberg (2022)

    Google Scholar 

  12. Dubslaff, C., Köhl, M.A.: Configurable-by-construction runtime monitoring. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 220–241. Springer, Heidelberg (2022)

    Google Scholar 

  13. Gorostiaga, F., Zudaire, S., Sánchez, C., Schneider, G., Uchitel, S.: Assumption monitoring of temporal task planning using stream runtime verification. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 397–414. Springer, Heidelberg (2022)

    Google Scholar 

  14. Kamburjan, E., Din, C.C., Schlatte, R., Tapia Tarifa, S.L., Johnsen, E.B.: Twinning-by-construction: ensuring correctness for self-adaptive digital twins. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 188–204. Springer, Heidelberg (2022)

    Google Scholar 

  15. Kittelmann, A., Runge, T., Bordis, T., Schaefer, I.: Runtime verification of correct-by-construction driving maneuvers. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 242–263. Springer, Heidelberg (2022)

    Google Scholar 

  16. Larsen, K.G., Legay, A., Nolte, G., Schlüter, M., Stoelinga, M., Steffen, B.: Introduction to formal methods meet machine learning (F3ML). In: Margaria, T., Steffen, B. (eds.) ISoLA 2022. LNCS, vol. 13703, pp. 393–405. Springer, Heidelberg (2022)

    Google Scholar 

  17. Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Log. Algebraic Methods Program. 78(5), 293–303 (2009). https://doi.org/10.1016/j.jlap.2008.08.004

    Article  MATH  Google Scholar 

  18. Nayak, S.P., Neider, D., Zimmermann, M.: Robustness-by-construction synthesis: adapting to the environment at runtime. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 149–173. Springer, Heidelberg (2022)

    Google Scholar 

  19. Riganelli, O., Micucci, D., Mariani, L.: Non-functional testing of runtime enforcers in Android. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 320–334. Springer, Heidelberg (2022)

    Google Scholar 

  20. Seisenberger, M., et al.: Safe and secure future AI-driven railway technologies: challenges for formal methods in railway. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022. LNCS, vol. 13704, pp. 246–268. Springer, Heidelberg (2022)

    Google Scholar 

  21. Tappler, M., Pranger, S., Könighofer, B., Muškardin, E., Bloem, R., Larsen, K.: Automata learning meets shielding. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022, LNCS 13701, pp. 335–359. Springer, Heidelberg (2022)

    Google Scholar 

  22. Wing, J.M.: Trustworthy AI. Commun. ACM 64(10), 64–71 (2021). https://doi.org/10.1145/3448248

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Maurice H. ter Beek or Loek Cleophas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

ter Beek, M.H., Cleophas, L., Leucker, M., Schaefer, I. (2022). X-by-Construction Meets Runtime Verification. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles. ISoLA 2022. Lecture Notes in Computer Science, vol 13701. Springer, Cham. https://doi.org/10.1007/978-3-031-19849-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-19849-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-19848-9

  • Online ISBN: 978-3-031-19849-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics