scholarly journals On the Expressiveness of some Runtime Validation Techniques

10.29007/j7qv ◽  
2018 ◽  
Author(s):  
Yliès Falcone ◽  
Jean-Claude Fernandez ◽  
Mounier Laurent

Runtime validation techniques have been proposed as artifacts to detect and/or correct unforeseen behaviours of computer systems.Their common features is to give only partial validation results, based on a restricted set of system executions produced in the real execution environment. A key issue is thus to better understand which kind of properties can (or cannot) be validated using such techniques.We focus on three techniques known as runtime verification, property-oriented testing, and runtime enforcement. We present these approaches at an abstract level and in a unified framework, and we discuss their respective ability to deal with properties on infinite execution sequences, that are commonly encountered in many application domains.

1997 ◽  
Vol 15 (1) ◽  
pp. 73-86 ◽  
Author(s):  
Patrick McHaffie

The current graphical rhetoric of advertising includes everything from images of the globe borrowed from the US space program (for example, Hewlett-Packard Corp. computer systems), to pseudotribal renderings of a very different sort [for example, Minute Maid's (The Coca Cola Co.) Fruitopia]. The use of these images are part of what Goldman calls the economy of ‘commodity signs’, where produced meanings are linked to commodities through the medium of the print or broadcast advertisement. The increased incorporation of global images in Western advertising presents an opportunity to analyze the ideological underpinning of the ‘new global economy’. The sheer volume of purchased advertising space places these often confusing images before our eyes at an increasing pace, producing meanings which tend to obfuscate and fetishize discourse related to globalism. A decoding of specific advertisements with the use of the Hewlett-Packard Corporation as a case study, juxtaposed against the real spatial practices of the company will reveal ruptures, contradictions, and incoherence in advertising messages which appropriate the symbolic power of global images.


2013 ◽  
Vol 09 (03n04) ◽  
pp. 1350019 ◽  
Author(s):  
XIAOLI YANG ◽  
YIFAN CAI ◽  
CHARLES TSENG

To enhance the effectiveness of learning genetics, we have developed a series of individual computer programs integrating interactivity with animated processes. It was noted that, although the content of the programs varied, the programs all contained a number of common features, including the ability to display text and images, present animated content, and interact with the user. These common features led us to the development of an innovative and unified framework of integrated functions for modeling and simulations. The framework, named "GeneAct" was developed to standardize and accelerate the development of the computer based genetics learning programs and was used as the application programming interface (API). The API allows the content to be imbued with rich text (text with multi-formats), static images, and animations; and it also allows the program to be interactive.


Geophysics ◽  
1998 ◽  
Vol 63 (6) ◽  
pp. 1898-1907 ◽  
Author(s):  
F. E. M. (Ted) Lilley

The decomposition procedure suggested for magnetotelluric (MT) data in a companion paper is illustrated by examples. Adjacent pairs of stations are examined to test for common features in their MT response. The method analyzes the real and quadrature parts of an impedance tensor separately, and the results for the real and quadrature parts are compared, and in some cases combined, at the end. Values are obtained which are interpreted directly in terms of nearest 2-D principal impedances, local geologic strike, and regional geologic strike. The requirement for valid data derived in the companion paper, that [Formula: see text] together with [Formula: see text], is shown to be a useful criterion in the winnowing of erroneous data. The examples presented typically show the direction interpreted as local geologic strike to be well determined, period independent, and consistent between real and quadrature MT matrices. In these examples, however, the direction interpreted as regional geologic strike is period dependent and not in good agreement between real and quadrature MT matrices. These results suggest caution is desirable in the use of period‐independent galvanic distortion models, which should be checked first with regional strike determinations.


Author(s):  
Yufeng Li ◽  
Le Tian ◽  
Han Qiu ◽  
Chuanhao Zhang

Router security defense technologies emerging in recent years could hardly detect and block the new booming threats with unknown signatures such as hardware Trojan, zero-day attacks, etc. We present a novel router defense technology, distributed router shadow, which builds a closed execution environment to deceive attacks entering into the router, thereby misleading the attackers into regarding it as the real attack target and executing the suspicious code to maximize the chances of detonating the system exploit; thus the original router is prevented from attacking and the suspicious code can be detected. Our experiment and analysis show that the router shadow can defend not only attacks with signature but also some new attacks without signature.


2021 ◽  
Author(s):  
Dan Costa Baciu

Creativity is found in artworks as well as in the color-ful feathers of paradise birds. Diversity is found in ecosystems as well as in cities. Digital signals are found in nerve cells as well as in computer systems. Can causal models explain why life is at once creative and diverse, and why it uses digital systems? This present text builds on common empirical observations as well as long accumulated modeling experience to develop a unified framework for causal modeling that applies to all sciences including physics, biology, and cultural studies. In this framework, life can be diverse, creative, and digital all at once.


2014 ◽  
Vol 573 ◽  
pp. 565-570
Author(s):  
B. John Samuel ◽  
M. Raja Gughan

The growth of interconnected computer increases the amount and obscurity of attacks. Computer systems require apt security mechanism. Intrusion detection and prevention systems play an important part in detecting and preventing the attacks before they conciliate software. Multi-variant execution environment is an intrusion detection and prevention mechanism that executes several slightly different versions of a program, called variants, in concurrency. The variants are defined as more than 2 same instances. These variants contain the same operational unit of the original program. The variants are built to have indistinguishable manners under normal execution environment. If any of the variant is under attack, there are noticeable divergences in their execution behavior. A monitor compares the execution manners of the variants at specific synchronization points and raises an alarm when a variance is detected.


Author(s):  
Mark Vella ◽  
Christian Colombo ◽  
Robert Abela ◽  
Peter Špaček

AbstractAnalytical security of cryptographic protocols does not immediately translate to operational security due to incorrect implementation and attacks targeting the execution environment. Code verification and hardware-based trusted execution solutions exist, however these leave it up to the implementer to assemble the complete solution, imposing a complete re-think of the hardware platforms and software development process. We rather aim for a comprehensive solution for secure cryptographic protocol execution, which takes the form of a trusted execution environment based on runtime verification and stock hardware security modules. RV-TEE can be deployed on existing platforms and protocol implementations. Runtime verification lends itself well at several conceptual levels of the execution environment, ranging from high level protocol properties, to lower level checks such as taint inference. The proposed architectural setup involving two runtime verification modules is instantiated through a case study using a popular web browser. We successfully monitor high and low level properties with promising results with respect to practicality.


Author(s):  
Tonghe Zhuang ◽  
Angelika Lingnau

AbstractObjects can be categorized at different levels of abstraction, ranging from the superordinate (e.g., fruit) and the basic (e.g., apple) to the subordinate level (e.g., golden delicious). The basic level is assumed to play a key role in categorization, e.g., in terms of the number of features used to describe these actions and the speed of processing. To which degree do these principles also apply to the categorization of observed actions? To address this question, we first selected a range of actions at the superordinate (e.g., locomotion), basic (e.g., to swim) and subordinate level (e.g., to swim breaststroke), using verbal material (Experiments 1–3). Experiments 4–6 aimed to determine the characteristics of these actions across the three taxonomic levels. Using a feature listing paradigm (Experiment 4), we determined the number of features that were provided by at least six out of twenty participants (common features), separately for the three different levels. In addition, we examined the number of shared (i.e., provided for more than one category) and distinct (i.e., provided for one category only) features. Participants produced the highest number of common features for actions at the basic level. Actions at the subordinate level shared more features with other actions at the same level than those at the superordinate level. Actions at the superordinate and basic level were described with more distinct features compared to those provided at the subordinate level. Using an auditory priming paradigm (Experiment 5), we observed that participants responded faster to action images preceded by a matching auditory cue corresponding to the basic and subordinate level, but not for superordinate level cues, suggesting that the basic level is the most abstract level at which verbal cues facilitate the processing of an upcoming action. Using a category verification task (Experiment 6), we found that participants were faster and more accurate to verify action categories (depicted as images) at the basic and subordinate level in comparison to the superordinate level. Together, in line with the object categorization literature, our results suggest that information about action categories is maximized at the basic level.


Sign in / Sign up

Export Citation Format

Share Document