Compressing Microcontroller Execution Traces to Assist System Analysis ,
DOI : 10.1007/978-3-642-38853-8_13
URL : https://hal.archives-ouvertes.fr/hal-00853716
Embedded Systems: Design, Analysis and Verification -4th IFIP TC 10 International Embedded Systems Symposium, Proceedings, volume 403 of IFIP Advances in Information and Communication Technology, pp.139-150, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01466697
Fault localization in embedded software based on a single cyclic trace, 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), pp.148-157, 2013. ,
DOI : 10.1109/ISSRE.2013.6698914
QVM: an efficient runtime for detecting defects in deployed systems, Proc. of OOPSLA 2008: the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp.143-162, 2008. ,
Timed regular expressions, Journal of the ACM, vol.49, issue.2, 2001. ,
DOI : 10.1145/506147.506151
URL : https://hal.archives-ouvertes.fr/hal-01699969
A Monitoring Tool for a Branching-Time Logic, Proc. of RV'16, pp.473-481, 2016. ,
Trace Partitioning and Local Monitoring for Asynchronous Components, SEFM, volume 10469 of LNCS, pp.219-235, 2017. ,
abc, Proceedings of the 4th international conference on Aspect-oriented software development , AOSD '05, pp.293-334, 2006. ,
DOI : 10.1145/1052898.1052906
Runtime Verification Using a Temporal Description Logic, Proc. of FroCoS 2009: the 7th International Symposium on Frontiers of Combining Systems, pp.149-164, 2009. ,
DOI : 10.1006/inco.1994.1092
Quantified Event Automata: Towards Expressive and Efficient Runtime Monitors, In FM, pp.68-84, 2012. ,
DOI : 10.1007/978-3-642-32759-9_9
URL : https://hal.archives-ouvertes.fr/hal-00857285
Program monitoring with LTL in Eagle, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings., 2004. ,
DOI : 10.1109/IPDPS.2004.1303336
Rule-Based Runtime Verification, VMCAI, pp.44-57, 2004. ,
DOI : 10.1007/978-3-540-24622-0_5
URL : http://ic.arc.nasa.gov/m/pub/661h/0661%20(Barringer).pdf
TraceContract: A Scala DSL for Trace Analysis, Proc. of FM 2011: the 17th International Symposium on Formal Methods, pp.57-72, 2011. ,
DOI : 10.1007/978-3-642-16612-9_5
Rule Systems for Run-time Monitoring: from EAGLE to RULER, Journal of Logic and Computation, vol.337, issue.4, pp.675-706, 2010. ,
DOI : 10.1145/321250.321254
First International Competition on Software for Runtime Verification, Proc. of RV 2014: the 5th International Conference on Runtime Verification, pp.1-9, 2014. ,
DOI : 10.1007/978-3-319-11164-3_1
URL : https://hal.archives-ouvertes.fr/hal-01120552
Model Checking Biological Oscillators, Electronic Notes in Theoretical Computer Science, vol.229, issue.1, pp.41-58, 2009. ,
DOI : 10.1016/j.entcs.2009.02.004
Detecting synchronisation of biological oscillators by model checking, Theoretical Computer Science, vol.411, issue.20, pp.1999-2018, 2010. ,
DOI : 10.1016/j.tcs.2009.12.019
Oded Maler, Dejan Nickovic, and Sriram Sankaranarayanan. Specification-based monitoring of cyber-physical systems: A survey on theory, tools and applications, Handbook of Runtime Verification -Introductory and Advanced Topics, 2018. ,
First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014, International Journal on Software Tools for Technology Transfer, vol.53, issue.4, 2017. ,
DOI : 10.1016/j.comnet.2008.09.022
Adaptive Runtime Verification, Proc. of RV 2012: the Third International Conference on Runtime Verification, pp.168-182, 2013. ,
DOI : 10.1007/978-3-642-35632-2_18
Monitoring Metric First-Order Temporal Properties, Journal of the ACM, vol.62, issue.2, pp.1-1545, 2015. ,
DOI : 10.1145/1108906.1108908
Runtime Verification of Temporal Properties over Out-of-Order Data Streams, CAV 2017, pp.356-376, 2017. ,
DOI : 10.1109/ICSE.2004.1317464
Almost Event-Rate Independent Monitoring of Metric Dynamic Logic, Proc. of RV 2017: the 17th International Conference on Runtime Verification, pp.85-102, 2017. ,
DOI : 10.1016/S0019-9958(83)80051-5
The ins and outs of first-order runtime verification. Formal Methods in System Design, pp.286-316, 2015. ,
The Good, the Bad, and the Ugly, But How Ugly Is Ugly?, Proc. of RV 2007: the 7th International Workshop on Runtime Verification, pp.126-138, 2007. ,
DOI : 10.1007/978-3-540-77395-5_11
The Good, the Bad, and the Ugly, But How Ugly Is Ugly?, Runtime Verification, 7th International Workshop, pp.126-138, 2007. ,
DOI : 10.1007/978-3-540-77395-5_11
Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, vol.20, issue.4, pp.1-1464, 2011. ,
DOI : 10.1145/2000799.2000800
Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, vol.20, issue.4, pp.1-1464, 2011. ,
DOI : 10.1145/2000799.2000800
SALT???Structured Assertion Language for Temporal Logic, Proc. of ICFEM 2006: the 8th International Conference on Formal Engineering Methods, pp.757-775, 2006. ,
DOI : 10.1007/11901433_41
Decentralised ltl monitoring. Formal Methods in System Design, pp.49-93, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-00857286
Runtime verification with minimal intrusion through parallelism. Formal Methods in System Design, pp.317-348, 2015. ,
Anywhere, any-time binary instrumentation, Proc. of PASTE'11: the 10th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools, pp.9-16, 2011. ,
Do you really mean what you actually enforced?, International Journal of Information Security, vol.206, issue.2???4, pp.239-254, 2011. ,
DOI : 10.1145/353323.353382
Racer, Proceedings of the 2008 international symposium on Software testing and analysis, ISSTA '08, pp.155-166, 2008. ,
DOI : 10.1145/1390630.1390650
Frequency Linear-time Temporal Logic, 2012 Sixth International Symposium on Theoretical Aspects of Software Engineering, pp.85-92 ,
DOI : 10.1109/TASE.2012.43
URL : https://hal.archives-ouvertes.fr/hal-00776769
Sampling-Based Runtime Verification, Proc. of FM 2011: the 17th International Symposium on Formal Methods, pp.88-102, 2011. ,
DOI : 10.1007/978-3-642-04694-0_13
What are the key issues for commercial AOP use, Proceedings of the 3rd international conference on Aspect-oriented software development , AOSD '04, pp.5-6, 2004. ,
DOI : 10.1145/976270.976273
An infrastructure for adaptive dynamic optimization, International Symposium on Code Generation and Optimization, 2003. CGO 2003., pp.265-275, 2003. ,
DOI : 10.1109/CGO.2003.1191551
A Controlled Natural Language for Tax Fraud Detection, Proc. of CNL 2016: the 5th International Workshop on Controlled Natural Language, pp.1-12, 2016. ,
DOI : 10.1007/978-3-642-31175-8_7
Process Algebra for Event-Driven Runtime Verification: A Case Study of Wireless Network Management, Proceedings of the 9th International Conference on Integrated Formal Methods, IFM'12, pp.21-23, 2012. ,
DOI : 10.1007/978-3-642-30729-4_2
On Synchronous and Asynchronous Monitor Instrumentation for Actor-based systems, Proceedings 13th International Workshop on Foundations of Coordination Languages and Self-Adaptive Systems of Electronic Proceedings in Theoretical Computer Science, pp.54-68, 2014. ,
DOI : 10.1109/MIC.2011.100
Runtime Adaptation for Actor Systems, Runtime Verification (RV), pp.38-54, 2015. ,
DOI : 10.1007/s10515-005-6205-y
On Implementing a Monitor-Oriented Programming Framework for Actor Systems, IFM, pp.176-192, 2016. ,
DOI : 10.1109/MIC.2011.100
A Survey of Runtime Monitoring Instrumentation Techniques, PrePost@iFM, pp.15-28 ,
DOI : 10.1007/978-3-319-46982-9_32
Refining interval temporal logic specifications, Proc. of ARTS'97: th 4th International AMAST Workshop on Real-Time Systems and Concurrent and Distributed Software, pp.79-94, 1997. ,
DOI : 10.1016/0304-3975(94)90096-5
URL : http://www.cse.dmu.ac.uk/~cau/papers/itlextension.ps.gz
Towards Monitoring-Oriented Programming, ENTCS, pp.106-125, 2003. ,
DOI : 10.1016/S1571-0661(04)81045-4
URL : https://doi.org/10.1016/s1571-0661(04)81045-4
Java-MOP: A Monitoring Oriented Programming Environment for Java, TACAS'05, pp.546-550, 2005. ,
DOI : 10.1007/978-3-540-31980-1_36
MOP: An Efficient and Generic Runtime Verification Framework, OOPSLA, pp.569-588, 2007. ,
Parametric Trace Slicing and Monitoring, TACAS 2009, pp.246-261, 2009. ,
DOI : 10.1109/ASE.2008.25
Efficient checking of temporal integrity constraints using bounded history encoding, ACM Transactions on Database Systems, vol.20, issue.2, pp.149-186, 1995. ,
DOI : 10.1145/210197.210200
An LTL Proof System for Runtime Verification, TACAS, pp.581-595, 2015. ,
DOI : 10.1007/978-3-662-46681-0_54
Temporal logics for hyperproperties, Proc. of POST 2014: the Third International Conference on Principles of Security and Trust, pp.265-284, 2014. ,
Organising LTL monitors over distributed systems with a global clock. Formal Methods in System Design, pp.109-158, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01120551
polyLarva: Runtime Verification with Configurable Resource-Aware Monitoring Boundaries, In SEFM, pp.218-232, 2012. ,
DOI : 10.1007/978-3-642-33826-7_15
Industrial Experiences with Runtime Verification of Financial Transaction Systems: Lessons Learnt and Standing Challenges, Handbook of Runtime Verification -Introductory and Advanced Topics, 2018. ,
DOI : 10.1007/978-3-642-40561-7_17
LARVA --- Safer Monitoring of Real-Time Java Programs (Tool Paper), 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods, pp.33-37, 2009. ,
DOI : 10.1109/SEFM.2009.13
Self-Adaptive Monitors for Multiparty Sessions, 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, pp.688-696, 2014. ,
DOI : 10.1109/PDP.2014.18
RV-Android: Efficient Parametric Android Runtime Verification, a Brief Tutorial, Runtime Verification -6th International Conference Proceedings, volume 9333 of Lecture Notes in Computer Science, pp.342-357, 2015. ,
DOI : 10.1007/978-3-540-77395-5_3
URL : https://hal.archives-ouvertes.fr/hal-01248350
Linear temporal logic and linear dynamic logic on finite traces, Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, IJCAI '13, pp.854-860, 2013. ,
On Freeze LTL with Ordered Attributes, FoSSaCS 2016, pp.269-284, 2016. ,
DOI : 10.1007/978-3-642-15155-2_54
Topology, monitorable properties and runtime verification, Theoretical Computer Science, vol.537, pp.29-41, 2014. ,
DOI : 10.1016/j.tcs.2014.02.052
A note on monitors and Büchi automata, Theoretical Aspects of Computing -ICTAC 2015 -12th International Colloquium Cali Proceedings, volume 9399 of Lecture Notes in Computer Science, pp.39-57, 2015. ,
Blocking Advertisements on Android Devices Using Monitoring Techniques, Specialized Techniques and Applications -6th International Symposium Proceedings, Part II, pp.239-253, 2014. ,
DOI : 10.1007/978-3-662-45231-8_17
URL : https://hal.archives-ouvertes.fr/hal-01120550
Monitoring decentralized specifications, Bultan and Sen, pp.125-135 ,
THEMIS: a tool for decentralized monitoring algorithms, Bultan and Sen [46], pp.372-375 ,
Temporal and Modal Logic, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B), pp.995-1072, 1990. ,
DOI : 10.1016/B978-0-444-88074-1.50021-4
The Inlined Reference Monitor approach to Security Policy Enforcement, 2004. ,
A tutorial on runtime verification, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00853727
Weave droid: aspect-oriented programming on android devices: fully embedded or in the cloud, IEEE/ACM International Conference on Automated Software Engineering, ASE'12, pp.350-353, 2012. ,
Runtime Verification and Enforcement for Android Applications with RV-Droid, Runtime Verification, Third International Conference, RV 2012, pp.88-95, 2012. ,
DOI : 10.1007/978-3-642-35632-2_11
Runtime verification of safety-progress properties, Proc. of RV 2009: the 9th International Workshop on Runtime Verification, pp.40-59, 2009. ,
What can you verify and enforce at runtime? STTT, pp.349-382, 2012. ,
A tutorial on runtime verification, Engineering Dependable Software Systems NATO Science for Peace and Security Series, D: Information and Communication Security, pp.141-175, 2013. ,
Runtime verification of component-based systems, In SEFM LNCS, vol.7041, pp.204-220, 2011. ,
Runtime verification of component-based systems in the BIP framework with formally-proved sound and complete instrumentation, Software & Systems Modeling, vol.40, issue.1, pp.173-199, 2015. ,
DOI : 10.1109/SEFM.2009.13
Runtime error reaction and prevention, Handbook of Runtime Verification -Introductory and Advanced Topics, 2018. ,
Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Formal Methods in System Design, pp.223-262, 2011. ,
A stream-based specification language for network monitoring. InYlì es Falcone and César Sánchez, RV 2016, pp.152-168, 2016. ,
Artemis: practical runtime monitoring of applications for execution anomalies, Proc. of the ACM SIGPLAN 2006: Conference on Programming Language Design and Implementation, pp.84-95, 2006. ,
On Time-Aware Instrumentation of Programs, 2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium, pp.305-314, 2009. ,
DOI : 10.1109/RTAS.2009.26
Ieee 1850 psl: The next generation, 2005. ,
A Theory of Monitors, FoSSaCS, pp.145-161, 2016. ,
DOI : 10.1007/978-1-4615-1663-7
Consistently-Detecting Monitors, In CONCUR LIPIcs, vol.85, issue.8, pp.1-8, 2017. ,
A Foundation for Runtime Monitoring, Proc. of RV 2017: the 17th International Conference on Runtime Verification, pp.8-29, 2017. ,
DOI : 10.1007/978-3-642-40787-1_23
On Verifying Hennessy-Milner Logic with Recursion at Runtime, Runtime Verification -6th International Conference, 2015. ,
DOI : 10.1007/978-3-540-40965-6_17
Monitorability for the Hennessy???Milner logic with recursion, Formal Methods in System Design, vol.83, issue.1, p.2017 ,
DOI : 10.4204/EPTCS.208.5
Distributed System Contract Monitoring, JLAP, vol.82, issue.5 7, pp.186-215, 2013. ,
DOI : 10.1016/j.jlap.2013.04.001
URL : https://doi.org/10.1016/j.jlap.2013.04.001
Runtime verification for decentralized and distributed systems, Handbook of Runtime Verification -Introductory and Advanced Topics, 2018. ,
Synthesising Correct concurrent Runtime Monitors, FMSD, vol.46, issue.3, pp.226-261, 2015. ,
DOI : 10.1007/978-3-642-40787-1_7
URL : https://www.um.edu.mt/library/oar//bitstream/123456789/23256/1/rv13jour.pdf
Disciplined Structured Communications with Disciplined Runtime Adaptation, Sci. of Computer Programming, vol.97, issue.2, pp.235-265, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01052441
Automated runtime verification with eagle In Modelling, Simulation, Verification and Validation of Enterprise Information Systems, Proceedings of the 3rd International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems, MSVVEIS 2005, In conjunction with ICEIS 2005, 2005. ,
Runtime Monitoring of Message-Based Workflows with Data, 2008 12th International IEEE Enterprise Distributed Object Computing Conference, pp.63-72, 2008. ,
DOI : 10.1109/EDOC.2008.32
Low-overhead memory leak detection using adaptive statistical profiling, Proc. of ASPLOS: the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, pp.156-164, 2004. ,
Rule-based runtime verification revisited, International Journal on Software Tools for Technology Transfer, vol.4, issue.3, pp.143-170, 2015. ,
DOI : 10.1109/SFCS.1977.32
Verify Your Runs, Verified Software: Theories, Tools, Experiments, First IFIP TC 2/WG 2.3 Conference, VSTTE 2005 Revised Selected Papers and Discussions, pp.374-383, 2005. ,
DOI : 10.1016/S1571-0661(04)81049-1
Runtime verification logics -a language design perspective In KIMfest -a conference in honour of Kim G. Larsen on the occasion of his 60th birthday, LNCS, vol.TBD, 2017. ,
Monitoring Events that Carry Data, Handbook of Runtime Verification -Introductory and Advanced Topics, 2018. ,
DOI : 10.1016/j.entcs.2006.02.007
Software monitoring with controllable overhead, International Journal on Software Tools for Technology Transfer, vol.38, issue.2, pp.327-347, 2012. ,
DOI : 10.1137/0325013
From signal temporal logic to FPGA monitors, 2015 ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE), pp.218-227, 2015. ,
DOI : 10.1109/MEMCOD.2015.7340489
Quantitative monitoring of STL with edit distance, Proc. of RV 2016: the 16th International Conference on Runtime Verification, pp.201-218, 2016. ,
Runtime Verification with Particle Filtering, Proc. of RV 2013: the 4th International Conference on Runtime Verification, pp.149-166, 2013. ,
DOI : 10.1007/978-3-642-40787-1_9
URL : http://www.cs.stonybrook.edu/~stoller/papers/rv2013.pdf
An Overview of AspectJ, Proc. of ECOOP 2001: the 15th European Conference on Object-Oriented Programming, pp.327-353, 2001. ,
DOI : 10.1007/3-540-45337-7_18
Computational Analysis of Run-time Monitoring, Electronic Notes in Theoretical Computer Science, vol.70, issue.4, pp.80-94, 2002. ,
DOI : 10.1016/S1571-0661(04)80578-4
Assuring the Guardians, RV, pp.87-101, 2015. ,
DOI : 10.1007/978-3-540-89247-2_2
PEBIL: Efficient static binary instrumentation for Linux, 2010 IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS), pp.175-183, 2010. ,
DOI : 10.1109/ISPASS.2010.5452024
Theoretical Aspects of Computing -ICTAC 2015 - 12th International Colloquium Cali, Colombia, Proceedings, volume 9399 of Lecture Notes in Computer Science, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01257171
Regular Linear Temporal Logic, Proc. of ICTAC 2007: the 4th International Colloquium on Theoretical Aspects of Computing, pp.291-305, 2007. ,
DOI : 10.1007/978-3-540-75292-9_20
URL : http://theory.stanford.edu/~cesar/papers/2007/ictac07/ictac07.pdf
A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2009. ,
DOI : 10.1016/j.jlap.2008.08.004
Regular Expressions for Data Words, Proc. of LPAR-18: the 18th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning, pp.274-288, 2012. ,
DOI : 10.1007/978-3-642-28717-6_22
Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005. ,
DOI : 10.1145/325694.325728
Discovering Concurrency Errors, Handbook of Runtime Verification -Introductory and Advanced Topics, 2018. ,
DOI : 10.1145/1736020.1736041
Pin: building customized program analysis tools with dynamic instrumentation, Proc. of the ACM SIGPLAN 2005: the Conference on Programming Language Design and Implementation, pp.190-200, 2005. ,
EnforceMOP: a runtime property enforcement system for multithreaded programs, Proceedings of the 2013 International Symposium on Software Testing and Analysis, ISSTA 2013, 2013. ,
DOI : 10.1145/2483760.2483766
Runtime verification of pacemaker using fuzzy logic and colored Petri-nets, 2015 4th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), pp.1-5, 2015. ,
DOI : 10.1109/CFIS.2015.7391705
Monitoring temporal properties of continuous signals Joint International Conferences on Formal Modelling and Analysis of Timed Systems, FOR- MATS 2004 and Formal Techniques in Real-Time and Fault-Tolerant Systems, Proc. of FOR- MATS, pp.152-166, 2004. ,
Leveraging Applications of Formal Methods, Verification and Validation . Specialized Techniques and Applications -6th International Symposium, Proceedings, Part II, 2014. ,
An overview of the MOP runtime verification framework, International Journal on Software Tools for Technology Transfer, vol.11, issue.6, pp.1-41, 2011. ,
DOI : 10.1145/363347.363387
Verified Software: Theories, Tools, Experiments, First IFIP TC 2, Revised Selected Papers and Discussions, 2005. ,
BIRD: Binary Interpretation using Runtime Disassembly, International Symposium on Code Generation and Optimization (CGO'06), pp.358-370, 2006. ,
DOI : 10.1109/CGO.2006.6
URL : http://www.ecsl.cs.sunysb.edu/tr/TR190.pdf
Concurrency-preserving and sound monitoring of multi-threaded component-based systems: theory, algorithms, implementation, and evaluation, Formal Aspects of Computing, vol.136, issue.2, pp.951-986, 2017. ,
DOI : 10.1006/inco.1997.2634
URL : https://hal.archives-ouvertes.fr/hal-01653883
Valgrind: a framework for heavyweight dynamic binary instrumentation, Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation, pp.89-100, 2007. ,
The HAR- MONIA project: Hardware monitoring for automotive systems-of-systems, Proc. of ISoLA 2016: 7th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, pp.371-379, 2016. ,
Runtime verification of statechart implementations In Architecting Dependable Systems III [the book is a result of the ICSE, LNCS, vol.3549, pp.148-172, 2004. ,
The temporal logic of programs, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp.46-57, 1977. ,
DOI : 10.1109/SFCS.1977.32
PSL Model Checking and Run-Time Verification Via Testers, FM 2006: Formal Methods, 14th International Symposium on Formal Methods Proceedings, pp.573-586, 2006. ,
DOI : 10.1007/11813040_38
What is a trace? a runtime verification perspective Leveraging Applications of Formal Methods, Verification and Validation: Disc ussion, Dissemination, Applications: 7th International Symposium Proceedings, Part II, pp.339-355, 2016. ,
From First-order Temporal Logic to Parametric Trace Slicing, RV 2015, pp.216-232, 2015. ,
DOI : 10.1016/j.entcs.2006.02.007
Rewriting-Based Techniques for Runtime Verification, Automated Software Engineering, vol.32, issue.3, pp.151-197, 2005. ,
DOI : 10.1007/978-1-4612-4222-2
Allen Linear (Interval) Temporal Logic ??? Translation to LTL and Monitor Synthesis, Proceedings of 18th International Conference on Computer Aided Verification, pp.263-277, 2006. ,
DOI : 10.1007/11817963_25
Dynamic Detection and Mitigation of DMA Races in MPSoCs, 2015 Euromicro Conference on Digital System Design, pp.267-270, 2015. ,
DOI : 10.1109/DSD.2015.77
URL : https://hal.archives-ouvertes.fr/hal-01248352
Embedded Systems: Design, Analysis and Verification -4th IFIP TC 10 International Embedded Systems Symposium, IESS 2013 Proceedings, volume 403 of IFIP Advances in Information and Communication Technology, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01466697
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
Runtime Monitoring with Recovery of the SENT Communication Protocol, Proc. of CAV 2017: the 29th International Conference on Computer Aided Verification, pp.336-355, 2017. ,
DOI : 10.1109/MEMCOD.2015.7340489
Applying Runtime Monitoring for Automotive Electronic Development, Proc. of RV 2016: the 16th International Conference on Runtime Verification, pp.462-469, 2016. ,
DOI : 10.1007/978-3-540-73368-3_12
Monitoring of MTL Specifications With IBM???s Spiking-Neuron Model, Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp.924-929, 2016. ,
DOI : 10.3850/9783981537079_0139
Efficient decentralized monitoring of safety in distributed systems, Proceedings. 26th International Conference on Software Engineering, pp.418-427, 2004. ,
DOI : 10.1109/ICSE.2004.1317464
Interaspect: aspect-oriented instrumentation with GCC. Formal Methods in System Design, pp.295-320, 2012. ,
DOI : 10.1007/s10703-012-0171-3
Introduction to the special section on runtime verification, International Journal on Software Tools for Technology Transfer, vol.32, issue.1, pp.243-247, 2012. ,
DOI : 10.1109/TSE.2006.1599419
The design and implementation of aspectc++. Know.-Based Syst, pp.636-651, 2007. ,
Runtime verification with state estimation, Proc. of RV 2011: the 2nd International Conference on Runtime Verification, pp.193-207, 2012. ,
On-Chip Instrumentation, 2011. ,
DOI : 10.1007/978-1-4419-7563-8
Temporal Assertions with Parametrized Propositions, Journal of Logic and Computation, vol.20, issue.3, pp.743-757, 2010. ,
DOI : 10.1093/logcom/exn078
Monitoring Algorithms for Metric Temporal Logic Specifications, Electronic Notes in Theoretical Computer Science, vol.113, pp.145-162, 2005. ,
DOI : 10.1016/j.entcs.2004.01.029
Bruce Lindsay speaks out, ACM SIGMOD Record, vol.34, issue.2, pp.71-79, 2005. ,
DOI : 10.1145/1083784.1083803
Run-time analysis of time-critical systems, Journal of Systems Architecture, vol.51, issue.5, pp.331-345, 2005. ,
DOI : 10.1016/j.sysarc.2004.12.003