CN107273288B - Bounded runtime verification system with linear temporal logical properties of past tenses - Google Patents

Bounded runtime verification system with linear temporal logical properties of past tenses Download PDF

Info

Publication number
CN107273288B
CN107273288B CN201710434655.3A CN201710434655A CN107273288B CN 107273288 B CN107273288 B CN 107273288B CN 201710434655 A CN201710434655 A CN 201710434655A CN 107273288 B CN107273288 B CN 107273288B
Authority
CN
China
Prior art keywords
property
event
verification
property specification
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710434655.3A
Other languages
Chinese (zh)
Other versions
CN107273288A (en
Inventor
黄滟鸿
熊家文
史建琦
何积丰
李昂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI FORMAL TECH INFORMATION TECHNOLOGY Co.,Ltd.
Original Assignee
Shanghai Fenglei Information Technology Co Ltd
East China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Fenglei Information Technology Co Ltd, East China Normal University filed Critical Shanghai Fenglei Information Technology Co Ltd
Priority to CN201710434655.3A priority Critical patent/CN107273288B/en
Publication of CN107273288A publication Critical patent/CN107273288A/en
Application granted granted Critical
Publication of CN107273288B publication Critical patent/CN107273288B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3644Software debugging by instrumenting at runtime

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a bounded runtime verification system with linear temporal logical properties of past tenses, comprising: the property mining subsystem is used for performing simulation operation on the system by using the test data in a system development stage so as to acquire and store the event information of the system in actual operation in an event log, and is used for automatically acquiring all linear temporal logic properties with past temporal states in the system operation process from the event log and storing the linear temporal logic properties in a screenable property specification set; and the property verification subsystem is used for monitoring system events in the system operation stage and checking and verifying the temporal property of the system by using the screened property specification set. The verification standard of the design stage can be applied to the runtime verification stage, so that the problem which cannot be solved in the past and can be solved only by a professional system design developer can be solved through the non-system design developer and the developer, and the redevelopment of a verification program is avoided.

Description

Bounded runtime verification system with linear temporal logical properties of past tenses
Technical Field
The invention relates to the field of system design development and verification, in particular to a bounded runtime verification system with linear temporal logic properties of past tenses.
Background
With the increasing popularization of computer technology, the participation degree of computer systems in human production and life is increasing day by day, and the influence of the safety and the reliability of the computer systems on the human production and life is also increasing day by day.
In order to ensure the safety and reliability of the system, various modes are adopted to avoid various safety and reliability problems of the software system at different stages of development and operation of the software system.
For example, in the stage of demand design, designers use a model detection technology to model a system by using models such as a migration system and an automaton, describe or define properties through a logic language, check the condition that the properties of the system model meet through strict mathematical reasoning and proof, and verify the properties of the models, so that safety and reliability problems possibly existing in system design can be eliminated in the primary system analysis and design stage.
In the development stage, a development engineer performs static analysis on a program code through a development auxiliary tool, checks errors such as a code style, syntax semantics and the like contained in the program code, and performs function check of different granularities on the program through a plurality of test technologies such as unit test, function test and the like. And the compiled program is checked by using a corresponding object code checking technology, so that the potential safety hazard introduced by a compiler and a connector is eliminated.
However, in an actual running environment, the underlying system supporting the running and the harsh physical environment may have an impact on the actual running of the program. Therefore, in order to meet the requirements of safety and reliability during operation of some key systems, it is necessary to monitor the system during the operation of the system, implement the verification during the operation of the system, and detect the operation error of the system in time, so as to help the relevant responsible personnel to make an active response, thereby enhancing the reliability of the system.
However, in the field of runtime verification, it is often necessary to manually set system specifications, i.e. the properties that the system needs to be checked, which greatly affects the ease of use of the verification system. Moreover, human system specification establishment, typically based on human understanding of the system, will likely present some deviation from understanding, which in turn affects the accuracy of the system specification. In addition, the establishment of artificial specifications is usually described by natural language and then implemented by a program, and in the expression process of natural language, ambiguity often exists, which may cause the implementation of the verification program to have reliability problem.
Therefore, it is necessary to provide a technical solution that can selectively apply the verification specification in the design stage to the runtime verification stage, so that the non-system design developer can solve the problem that the non-system design developer cannot solve the problem in the past and must rely on the professional system design developer to solve, and at the same time, the re-development of the verification program is avoided.
Disclosure of Invention
To solve the above problems, the present invention discloses a bounded runtime verification system with linear temporal logical properties of past tenses, comprising: the property mining subsystem is used for performing simulation operation on the system by using the test data in a system development stage so as to acquire and store the event information of the system in actual operation in an event log, and is used for automatically acquiring all linear temporal logic properties with past temporal states in the system operation process from the event log and storing the linear temporal logic properties as screenable property specifications; and the property verification subsystem is used for monitoring system events in the system operation stage and checking and verifying the temporal property of the system by using the screened property specification set.
According to the verification system of the present invention, the property mining subsystem includes: the event acquisition module is used for acquiring event information according to the environment and specific requirements of the target system; the event log storage module is used for storing and inquiring the event information collected by the system event collection module; and the property specification mining module is used for automatically mining the past-temporal linear temporal logic properties of the system from the event log storage module according to the configured past-temporal linear temporal logic property specification template and storing the past-temporal linear temporal logic properties in the screenable property specification set.
According to the verification system of the present invention, the property verification subsystem includes: the event acquisition module is used for acquiring event information according to the environment and specific requirements of the target system; the event log caching module is used for caching system events in a limited time period during the running of the system so as to be used for subsequent property verification; and the bounded verification module is used for performing property check on the event sequence in the event log caching module by using the screened property specification set during the running process so as to verify whether the system conforms to the relevant properties in the screened property specification set during the running process.
According to the verification system of the invention, the event collection module of the property mining subsystem comprises: the hardware monitoring unit is realized by hardware, is connected to a sensor component or a data bus of the system and is used for collecting data of the system in a fixed time period; the signal conversion unit is used for preprocessing the acquired data according to the requirement, wherein the preprocessing comprises at least one of analog-to-digital conversion and precision interception; and the event output unit is used for outputting the preprocessed data as a system event.
According to the verification system of the present invention, the event log storage module of the property mining subsystem includes: the event adding unit is used for receiving event input, associating the event with the time information and then outputting corresponding event information; the event storage unit is used for storing the event information in a hash table form so as to ensure the high efficiency of insertion and query; and the event query unit is used for providing a query interface, performing accurate query and fuzzy query on event related statistical information, performing query on event occurrence time or event occurrence conditions in a specific time period, performing query on all events occurring in the system, and providing a data basis for property specification mining.
According to the verification system of the present invention, the property specification mining module of the property mining subsystem includes: the property specification template input unit is used for providing an input interface of the property specification template, analyzing the property specification template, extracting proposition variables of the property specification template and carrying out preprocessing operation on the subsequent excavation work; the property specification mining unit is used for replacing the extracted propositional variable with a specific event, so that a property specification template is converted into a property specification example, when at least one of the support degree or the confidence degree of the property defined by the property specification example in the event sequence in the event log storage module meets the threshold set by a user, the property specification example is judged as the property specification example with the reference value and is stored in the screenable property specification set; and the property specification output unit is used for outputting the screenable property specification set.
According to the verification system, the event acquisition module of the property verification subsystem and the event acquisition module of the property mining subsystem have similar functions, but different working stages, and the information range acquired by the property verification subsystem is smaller than or equal to that acquired by the property mining subsystem.
According to the verification system, the event log cache module of the property verification subsystem and the event log storage module of the property mining subsystem have similar functions, but different working stages, the event log cache module is only used for supporting real-time event verification operation, all event logs are not required to be recorded, and the storage capacity is small.
According to the verification system of the present invention, the bounded verification module of the property verification subsystem comprises: the property specification input unit is used for providing an input interface of the property specification, receiving the screened property specification set screened by the engineer, analyzing the property specification and preprocessing the property specification; the property verifying unit is used for verifying the satisfaction condition of the property in the event sequence in the event log caching module according to the preprocessed property specification, and inquiring the event information from the event log caching module according to the requirement in the verifying process; and the result output unit is used for outputting the judgment result, the related property and the related log information when the property does not meet the preprocessed property specification.
In combination with the above disclosed bounded runtime verification system of linear temporal logical properties with past tenses, the present invention also discloses a bounded runtime verification method of linear temporal logical properties with past tenses, comprising: step 1: through a property mining subsystem, in a system development stage, simulation operation is carried out on a system by using test data so as to obtain event information of the system in actual operation and store the event information in an event log, and all linear temporal logic properties with past temporal states in the system operation process are automatically obtained from the event log and stored in a screenable property specification set; step 2: and monitoring system events in the system operation stage through the property verification subsystem, and checking and verifying the temporal property of the system by using the screened property specification set.
According to the verification method of the invention, the step 1 comprises the following steps: step 1-1: event information is acquired through an event acquisition module according to the environment and specific requirements of a target system; step 1-2: event information collected by the system event collecting module is stored and inquired through the event log storage module; step 1-3: and automatically mining the past-tense linear temporal logic properties of the system from the event log storage module through the property specification mining module according to the configured past-tense linear temporal logic property specification template, and storing the past-tense linear temporal logic properties in a screenable property specification set.
According to the verification method of the invention, step 2 comprises the following steps: step 2-1: event information is acquired through an event acquisition module according to the environment and specific requirements of a target system; step 2-2: caching system events in a limited time period during system operation through an event log caching module for subsequent property verification; step 2-3: the property check is performed on the event sequence in the event log cache module at runtime using the filtered property specification set by the bounded verification module to verify that the system conforms to the relevant property in the filtered property specification set during runtime.
According to the verification method of the invention, step 1-1 comprises the following steps: collecting data of a system in a fixed time period through a hardware monitoring unit; preprocessing acquired data according to requirements by a signal conversion unit, wherein the preprocessing comprises at least one of analog-to-digital conversion and precision interception; and outputting the preprocessed data as a system event through an event output unit.
According to the verification method of the invention, the step 1-2 comprises the following steps: receiving event input through an event adding unit, associating an event with time information and outputting corresponding event information; event information is stored in a hash table form through an event storage unit so as to ensure high efficiency of insertion and query; an event query unit provides a query interface, performs accurate query and fuzzy query on event related statistical information, performs query on event occurrence time or event occurrence conditions in a specific time period, performs query on all events occurring in the system, and provides a data basis for property specification mining.
According to the verification method of the invention, the steps 1-3 comprise: providing an input interface of the property specification template through the property specification template input unit, analyzing the property specification template, extracting proposition variables in the property specification template, and performing preprocessing operation for subsequent mining work; replacing the extracted propositional variable with a specific event through a property specification mining unit, thereby converting a property specification template into a property specification example, judging the property specification example as the property specification example with reference value when at least one of the support degree and the confidence degree of the property defined by the property specification example in the event sequence in the event log storage module meets the threshold set by a user, and storing the property specification example in a screenable property specification set; and outputting the screenable property specification set through the property specification output unit.
The verification method according to the present invention has the similar steps 2-1 to 1 except that the working stages are different, and the range of information collected by the former is smaller than or equal to the range of information collected by the latter.
According to the verification method, the step 2-2 is similar to the step 1-2, only the working stages are different, the step 2-2 is only used for supporting real-time event verification operation, all event logs do not need to be recorded, and the storage capacity is small.
According to the verification method of the invention, the step 2-3 comprises the following steps: providing an input interface of the property specification through a property specification input unit, receiving a screened property specification set screened by an engineer, analyzing the property specification, and preprocessing the property specification; verifying, by a property verification unit, a satisfaction of a property in an event sequence within an event log caching module according to the preprocessed property specification, and inquiring event information from the event log caching module as needed during a verification process; and outputting the judgment result, the related property and the related log information through a result output unit when the property does not meet the preprocessed property specification.
According to the technical scheme, by combining a property formalization description technology in model detection, the linear time sequence relation among various events can be automatically mined from the running log of the system, the specific running rule of the system is obtained, the linear temporal logic property with past temporal in the software program is estimated, and the selected property can be automatically verified during the running period of the system after being screened by an engineer.
Unlike previous authentication systems: firstly, the properties required by the system specification can be automatically mined without manual setting, and people only need to select the properties which are considered to be correct and need to be verified from the results of automatic mining; secondly, corresponding verification logic does not need to be realized in the standard verification process, and the nature of the mined data is linear temporal logic with past temporal states, and the data can be directly verified by using a model detection technology. The whole system needs human participation part, and only has a property screening part. The automation degree of the system is greatly improved, so that the system has high usability.
Therefore, the technical scheme of the invention can selectively apply the verification specification in the design stage to the runtime verification stage, so that other personnel who are not designed and developed by the system can conveniently solve the problem which cannot be solved in the past and can only be solved by a very professional system design developer, and the redevelopment of the verification program is avoided.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 illustrates a block diagram of a bounded runtime verification system with linear temporal logical properties of past tenses, according to an embodiment of the present invention;
FIG. 2 illustrates a block diagram of an event collection module in a bounded runtime verification system with linear temporal logical properties of past tenses, according to an embodiment of the present invention;
FIG. 3 illustrates a block diagram of an event log storage module in a bounded runtime verification system with linear temporal logical properties of past tenses, according to an embodiment of the present invention;
FIG. 4 illustrates a block diagram of a property specification mining module in a bounded runtime verification system with linear temporal logical properties of past tenses, according to an embodiment of the present invention;
FIG. 5 illustrates a block diagram of a bounded runtime verification module in a bounded runtime verification system with linear temporal logical properties of past tenses, according to an embodiment of the present invention;
FIG. 6 illustrates a flow diagram of a bounded runtime verification method with linear temporal logical properties of past tenses, according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
FIG. 1 sets forth a block diagram of a bounded runtime verification system with linear temporal logical properties of past tenses according to embodiments of the present invention.
As shown in FIG. 1, the bounded runtime verification system includes a property mining subsystem and a property verification subsystem.
The property mining subsystem is used for performing simulation operation on the system by using the test data in a system development stage so as to acquire and store the event information of the system in actual operation in an event log, and is used for automatically acquiring the linear temporal logic property with past temporal state in the operation process of the system from the event log.
And the property verification subsystem is used for monitoring system events in the system operation stage and performing checking and verification of the temporal property on the system by using the screened property specification set.
It should be appreciated that, for a system, the logical formula used to define properties in linear temporal logic is a property specification, which is a combination of basic atomic propositions and logical connectives. Linear temporal logic may be used to define constraints on the chronological relationships between events in the system, thereby defining time-dependent properties. The linear tense logic with past tenses is different from the general linear tense logic, and also comprises a logical conjunction word for describing the past tenses, so that the property related to the past time can be defined, the property to be verified by the runtime verification can be visually described, and the linear tense logic is very suitable for the application of the runtime verification.
Optionally, as shown in FIG. 1, the property mining subsystem of the bounded runtime verification system may include an event collection module, an event log storage module, and a property specification mining module.
And the event acquisition module is used for acquiring event information according to the environment and the specific requirements of the target system.
The event log storage module is used for recording, storing and inquiring the events acquired by the system event acquisition module and providing an inquiry function of related event information for the outside.
And the property specification mining module is used for automatically mining the past-temporal linear temporal logic properties of the system from the event log storage module according to the configured past-temporal linear temporal logic property specification template and storing the past-temporal linear temporal logic properties in the screenable property specification set.
It should be understood that a template is actually a logical formula, except that the atomic propositions therein are replaced with variables.
FIG. 2 illustrates a block diagram of an event collection module in a bounded runtime verification system with linear temporal logic properties of past tenses, according to an embodiment of the present invention.
Optionally, as shown in fig. 2, the event collection module of the property mining subsystem includes a hardware monitoring unit, a signal conversion unit, and an event output unit.
The hardware monitoring unit is realized by hardware and is connected to a sensor component or a data bus of the system, and is used for collecting data of the system in a fixed time period.
The signal conversion unit is used for preprocessing the acquired data according to requirements, such as analog-to-digital conversion, precision interception and the like.
And the event output unit is used for outputting the preprocessed data as a system event.
FIG. 3 illustrates a block diagram of an event log storage module in a bounded runtime verification system with linear temporal logical properties of past tenses, according to an embodiment of the present invention.
Optionally, as shown in fig. 3, the event log storage module of the property mining subsystem includes an event adding unit, an event storage unit, and an event querying unit.
The event adding unit is used for receiving event input, associating the event with the time information and then outputting corresponding event information.
The event storage unit is used for storing the event information in a hash table form so as to ensure high efficiency of insertion and query.
The event query unit is used for providing a query interface, performing accurate query and fuzzy query on event related statistical information, performing query on event occurrence time or event occurrence conditions in a specific time period, performing query on all events occurring in the system, and providing a data basis for property specification mining.
FIG. 4 illustrates a block diagram of a property specification mining module in a bounded runtime verification system with linear temporal logical properties of past tenses, according to an embodiment of the present invention.
As shown in FIG. 4, the property specification mining module of the property mining subsystem includes a property specification template input unit, a property specification mining unit, and a property specification output unit.
The property specification template input unit is used for providing an input interface of the property template, analyzing the property specification template, extracting proposition variables of the property specification template and carrying out preprocessing operation on subsequent mining work.
And the property specification mining unit is used for replacing the extracted proposition variable with a specific event so as to convert a property specification template into a property specification example, and determining whether the property specification example is a property with reference value or not by verifying the support condition of the property specification example in the event log and taking a certain threshold value as a judgment standard.
And the property specification output unit is used for outputting the property specification examples with reference values as the property specifications.
As described above, when the propositional variables in the template are replaced with specific propositions (i.e., events), an instance of a property specification template (i.e., the property specification instance described above) becomes the subject.
Optionally, as shown in FIG. 1, the property verification subsystem of the bounded runtime verification system may include: the system comprises an event acquisition module, an event log caching module and a bounded verification module.
And the event acquisition module is used for acquiring event information according to the environment and the specific requirements of the target system.
The event log caching module is used for caching system events in a limited time period when the system runs so as to be used for subsequent property verification.
The bounded verification module is used for performing property check on the event sequence in the event log caching module by using the screened property specification set during the running process so as to verify whether the system conforms to the relevant property in the screened property specification set during the running process.
Optionally, the event collection module of the property verification subsystem and the event collection module of the property mining subsystem have similar functions, but different working stages, and the range of the information collected by the property verification subsystem is smaller than or equal to that collected by the property mining subsystem.
Optionally, the event log caching module of the property verification subsystem and the event log storage module of the property mining subsystem have similar functions, but different working stages, and the former is only used for supporting real-time event verification operation, and does not need to record all event logs, so that the storage capacity is small.
FIG. 5 sets forth a block diagram of bounded runtime verification modules in a bounded runtime verification system with linear tense logic of a past tense according to embodiments of the present invention.
Alternatively, as shown in FIG. 5, the bounded verification module of the property verification subsystem includes a property specification input unit, a property verification unit, and a result output unit.
The property specification input unit is used for providing an input interface of property specifications so as to receive a screened property specification set screened by an engineer, analyze the property specifications and perform preprocessing operation on the property specifications.
The property verifying unit is used for verifying the satisfaction condition of the property in the event sequence in the event log caching module according to the preprocessed property specification, and inquiring the event information from the event log caching module according to the requirement in the verifying process.
And the result output unit is used for outputting the judgment result, the related property and the related log information when the property does not meet the preprocessed property specification.
In addition, in combination with the bounded runtime verification system with past tense linear-tense logic properties shown in FIG. 1, a bounded runtime verification method with past tenses linear-tense logic properties is also disclosed.
FIG. 6 illustrates a flow diagram of a bounded runtime verification method with linear temporal logical properties of past tenses, according to an embodiment of the present invention.
As shown in fig. 6, the authentication method includes the steps of:
step 1: and through the property mining subsystem, in the system development stage, the system is subjected to simulation operation by using the test data so as to acquire and store the event information of the system in actual operation in an event log, and all linear temporal logic properties with past temporal states in the system operation process are automatically acquired from the event log and stored in a screenable property specification set.
Step 2: and monitoring system events in the system operation stage through the property verification subsystem, and checking and verifying the temporal property of the system by using the screened property specification set.
More specifically, in connection with the block diagram of the property mining subsystem shown in fig. 1, step 1 of the verification method comprises the following steps:
step 1-1: and event information is acquired through the event acquisition module according to the environment and the specific requirements of the target system.
Step 1-2: and storing and inquiring the event information acquired by the system event acquisition module through the event log storage module.
Step 1-3: and automatically mining the past-tense linear temporal logic properties of the system from the event log storage module through the property specification mining module according to the configured past-tense linear temporal logic property specification template, and storing the past-tense linear temporal logic properties in a screenable property specification set.
More specifically, in connection with the block diagram of the property verification subsystem shown in fig. 1, step 2 of the verification method comprises the steps of:
step 2-1: and event information is acquired through the event acquisition module according to the environment and the specific requirements of the target system.
Step 2-2: and caching the system events in a limited time period during the running of the system by the event log caching module for subsequent property verification.
Step 2-3: the property check is performed on the event sequence in the event log cache module at runtime using the filtered property specification set by the bounded verification module to verify that the system conforms to the relevant property in the filtered property specification set during runtime.
More specifically, in connection with the block diagram of the event collection module in the bounded runtime verification system according to the invention as shown in FIG. 2, step 1-1 of the verification method according to the invention comprises the following steps:
and collecting data of the system in a fixed time period through a hardware monitoring unit.
And preprocessing the acquired data according to requirements by a signal conversion unit, wherein the preprocessing comprises at least one of analog-to-digital conversion and precision interception.
And outputting the preprocessed data as a system event through an event output unit.
Moreover, step 2-1 of the authentication method according to the present invention is similar to step 1-1 except that the working phase is different, and the range of information acquired through step 2-1 is equal to or smaller than the range of information acquired through step 1-1.
More specifically, in connection with the block diagram of the event log storage module in the bounded runtime verification system according to the invention as shown in FIG. 3, steps 1-2 of the verification method according to the invention comprise the following steps:
and receiving event input through the event adding unit, associating the event with the time information and outputting corresponding event information.
The event information is stored in a hash table form through an event storage unit, so that the high efficiency of insertion and query is ensured.
An event query unit provides a query interface, performs accurate query and fuzzy query on event related statistical information, performs query on event occurrence time or event occurrence conditions in a specific time period, performs query on all events occurring in the system, and provides a data basis for property specification mining.
Moreover, step 2-2 of the verification method according to the invention is similar to step 1-2, except that the working stage is different, and step 2-2 is only used for supporting real-time event verification operation, and does not need to record all event logs, so that the storage capacity is smaller.
More specifically, in conjunction with the block diagram of the property specification mining module in the bounded runtime verification system according to the present invention as shown in FIG. 4, steps 1-3 of the verification method according to the present invention include the steps of:
and providing an input interface of the property specification template through the property specification template input unit, analyzing the property specification template, extracting proposition variables in the property specification template, and performing preprocessing operation on subsequent mining work.
And replacing the extracted propositional variable with a specific event through the property specification mining unit, thereby converting a property specification template into a property specification example, judging the property specification example as the property specification example with reference value when at least one of the support degree and the confidence degree of the property defined by the property specification example in the event sequence in the event log storage module meets the threshold set by the user, and storing the property specification example in the screenable property specification set.
And outputting the screenable property specification set through the property specification output unit.
More specifically, in conjunction with the block diagram of the bounded verification module in the bounded runtime verification system according to the present invention as shown in FIG. 5, steps 2-3 of the verification method according to the present invention include the steps of:
and providing an input interface of the property specification through the property specification input unit, receiving the screened property specification set screened by the engineer, analyzing the property specification, and preprocessing the property specification.
Verifying, by the property verification unit, the satisfaction of the property in the sequence of events within the event log caching module according to the preprocessed property specification, the event information being queried from the event log caching module as required during the verification process.
And outputting the judgment result, the related property and the related log information through a result output unit when the property does not meet the preprocessed property specification.
It should be noted that the steps in the verification method according to the present invention may be changed in order or combined, and are not necessarily performed in the above-described manner in one-to-one correspondence with the corresponding subsystems, modules or units in the structure diagrams shown in fig. 1 to 5. The above description of the steps of the authentication method of the present invention is for the purpose of facilitating a clear description of the authentication method of the present invention, and is by way of example only and not by way of limitation.
It should also be noted that the algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose devices may be used with the teachings herein. The required structure for constructing such a device will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known systems, structures, and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of various inventive aspects. However, the disclosed system should not be interpreted to reflect the intent: rather, the invention is claimed with additional features than those expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any system or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components in the creation apparatus of a virtual machine according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the system described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or modules not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (7)

1. A bounded runtime verification system with linear temporal logical properties of past tenses, comprising:
the property mining subsystem is used for performing simulation operation on the system by using the test data in a system development stage so as to acquire and store the event information of the system in actual operation in an event log, and is used for automatically acquiring all linear temporal logic properties with past temporal states in the system operation process from the event log and storing the linear temporal logic properties in a screenable property specification set;
the property verification subsystem is used for monitoring system events in the system operation stage and checking and verifying the temporal properties of the system by using the screened property specification set;
the property mining subsystem includes:
the event acquisition module is used for acquiring event information according to the environment and specific requirements of the target system;
the event log storage module is used for storing and inquiring the event information collected by the system event collection module;
the property specification mining module is used for automatically mining the linear temporal logic properties with the past tenses from the event log storage module according to the configured linear temporal logic property specification template with the past tenses and storing the linear temporal logic properties with the past tenses in a screenable property specification set;
the property verification subsystem includes:
the event acquisition module is used for acquiring event information according to the environment and specific requirements of the target system;
the event log caching module is used for caching system events in a limited time period during the running of the system so as to be used for subsequent property verification;
and the bounded verification module is used for performing property check on the event sequence in the event log caching module by using the screened property specification set during the running process so as to verify whether the system conforms to the relevant properties in the screened property specification set during the running process.
2. The verification system of claim 1, wherein the event collection module of the property mining subsystem comprises:
the hardware monitoring unit is realized by hardware, is connected to a sensor component or a data bus of the system and is used for collecting data of the system in a fixed time period;
the signal conversion unit is used for preprocessing the acquired data according to the requirement, wherein the preprocessing comprises at least one of analog-to-digital conversion and precision interception;
and the event output unit is used for outputting the preprocessed data as a system event.
3. The validation system of claim 1, wherein the event log storage module of the property mining subsystem comprises:
the event adding unit is used for receiving event input, associating the event with the time information and then outputting corresponding event information;
the event storage unit is used for storing the event information in a hash table form so as to ensure the high efficiency of insertion and query;
and the event query unit is used for providing a query interface, performing accurate query and fuzzy query on event related statistical information, performing query on event occurrence time or event occurrence conditions in a specific time period, performing query on all events occurring in the system, and providing a data basis for property specification mining.
4. The verification system of claim 1, wherein the property specification mining module of the property mining subsystem comprises:
the property specification template input unit is used for providing an input interface of the property specification template, analyzing the property specification template, extracting proposition variables in the property specification template and carrying out preprocessing operation on subsequent excavation work;
the property specification mining unit is used for replacing the extracted propositional variable with a specific event, so that a property specification template is converted into a property specification example, when at least one of the support degree or the confidence degree of the property defined by the property specification example in the event sequence in the event log storage module meets the threshold set by a user, the property specification example is judged as the property specification example with the reference value and is stored in the screenable property specification set;
and the property specification output unit is used for outputting the screenable property specification set.
5. The validation system of claim 1, wherein the event collection module of the property validation subsystem is functionally similar to the event collection module of the property mining subsystem, except for different phases, and wherein the range of information collected by the former is less than or equal to the range of information collected by the latter.
6. The validation system of claim 1, wherein the event log caching module of the property validation subsystem functions similarly to the event log storage module of the property mining subsystem, except that the operational phase is different, and wherein the event log caching module is only used to support real-time event validation operations without recording all event logs, and has a small amount of storage.
7. The verification system of claim 1, wherein the bounded verification module of the property verification subsystem comprises:
the property specification input unit is used for providing an input interface of the property specification, receiving the screened property specification set screened by the engineer, analyzing the property specification and preprocessing the property specification;
and the property verifying unit is used for verifying the satisfaction condition of the property in the event sequence in the event log caching module according to the preprocessed property specification, and inquiring the event information from the event log caching module according to the requirement in the verifying process.
CN201710434655.3A 2017-06-09 2017-06-09 Bounded runtime verification system with linear temporal logical properties of past tenses Active CN107273288B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710434655.3A CN107273288B (en) 2017-06-09 2017-06-09 Bounded runtime verification system with linear temporal logical properties of past tenses

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710434655.3A CN107273288B (en) 2017-06-09 2017-06-09 Bounded runtime verification system with linear temporal logical properties of past tenses

Publications (2)

Publication Number Publication Date
CN107273288A CN107273288A (en) 2017-10-20
CN107273288B true CN107273288B (en) 2020-02-18

Family

ID=60067456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710434655.3A Active CN107273288B (en) 2017-06-09 2017-06-09 Bounded runtime verification system with linear temporal logical properties of past tenses

Country Status (1)

Country Link
CN (1) CN107273288B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100483422C (en) * 2007-11-21 2009-04-29 中国科学院合肥物质科学研究院 Control method for agricultural complex adaptive search engine system
US20160292307A1 (en) * 2013-11-06 2016-10-06 Arizona Board Of Regents On Behalf Of Arizona State University Temporal logic robustness guided testing for cyber-physical systems
CN107229568B (en) * 2017-06-09 2018-09-18 华东师范大学 Bounded run time verification method with preterite linear temporal property

Also Published As

Publication number Publication date
CN107273288A (en) 2017-10-20

Similar Documents

Publication Publication Date Title
US9354867B2 (en) System and method for identifying, analyzing and integrating risks associated with source code
US8972938B2 (en) Determining functional design/requirements coverage of a computer code
CN102053906A (en) System and method for collecting program runtime information
CN111563606A (en) Equipment predictive maintenance method and device
CN101739339A (en) Program dynamic dependency relation-based software fault positioning method
US10657028B2 (en) Method for replicating production behaviours in a development environment
CN103294596A (en) Early warning method for contract-type software fault based on program invariants
KR102269286B1 (en) the automatic monitoring system for annotation
Jiang et al. Tracing back the history of commits in low-tech reviewing environments: a case study of the linux kernel
CN103970654B (en) Software reliability virtual test method
CN102043720A (en) Method and device for generating test data automatically by utilizing structured query language (SQL) sentences
CN103425580A (en) Method for automatically and rapidly obtaining and calibrating configuration information of cloud computing device
CN114880176A (en) Aviation data conversion unit test system, method and device
Lind et al. A practical approach to size estimation of embedded software components
CN107273288B (en) Bounded runtime verification system with linear temporal logical properties of past tenses
CN107229568B (en) Bounded run time verification method with preterite linear temporal property
Chaari et al. A model-based and simulation-assisted FMEDA approach for safety-relevant E/E systems
CN115775064A (en) Engineering decision calculation result evaluation method and cloud platform
CN113282496B (en) Automatic interface testing method, device, equipment and storage medium
Beine A model-based reference workflow for the development of safety-critical software
KR102106696B1 (en) Apparatus and method for testing software
CN112329124A (en) CAE model error checking method and device, computer equipment and storage medium
CN113282504A (en) Incremental code coverage rate detection method and service development method and device
CN111881055A (en) Simulink model design method for military software evaluation specification
CN112612882B (en) Review report generation method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210805

Address after: Room 801, no.6, Lane 600, Yunling West Road, Putuo District, Shanghai 200062

Patentee after: SHANGHAI FORMAL TECH INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 200062 No. 3663, Putuo District, Shanghai, Zhongshan North Road

Patentee before: EAST CHINA NORMAL University

Patentee before: SHANGHAI FORMAL TECH INFORMATION TECHNOLOGY Co.,Ltd.