M. Abadi and D. G. Andersen, Learning to protect communications with adversarial neural cryptography, 2016.

H. Abbas, G. E. Fainekos, S. Sankaranarayanan, F. Ivancic, and A. Gupta, Probabilistic temporal logic falsification of cyber-physical systems, ACM Trans Embed Comput Syst, vol.12, issue.s2, 2013.

H. Abbas, A. Winn, G. E. Fainekos, and A. A. Julius, Functional gradient descent method for metric temporal logic specifications, Proceedings of the American control conference (ACC'14, pp.2312-2317, 2014.

L. Aceto, A. Achilleos, A. Francalanza, and A. Ingólfsdóttir, Monitoring for silent actions, Proceedings of the 37th IARCS annual conference on foundations of software technology and theoretical computer science, vol.93, p.14, 2017.

L. Aceto, A. Achilleos, A. Francalanza, and A. Ingólfsdóttir, A framework for parameterized monitorability, Proceedings of the 21st Int'l conference on foundations of software science and computation structures (FOSSACS'18), vol.10803, pp.203-220, 2018.

L. Aceto, A. Achilleos, A. Francalanza, A. Ingólfsdóttir, and S. Ö. Kjartansson, On the complexity of determinizing monitors, Proceedings of the 22nd Int'l conference on implementation and application of automata (CIAA'17), vol.10329, pp.1-13, 2017.

L. Aceto, A. Achilleos, A. Francalanza, A. Ingólfsdóttir, and K. Lehtinen, Adventures in monitorability: from branching to linear time and back again, PACMPL, vol.3, p.29, 2019.

L. Aceto, I. Cassar, A. Francalanza, and A. Ingólfsdóttir, On runtime enforcement via suppressions, 29th International conference on concurrency theory, CONCUR 2018, vol.118, p.17, 2018.

S. Agarwal, B. Mozafari, A. Panda, H. Milner, S. Madden et al., BlinkDB: Queries with bounded errors and bounded response times on very large data, Proceedings of the 8th ACM European conference on computer systems (EuroSys '13, pp.29-42, 2013.

W. Ahrendt, G. J. Pace, and G. Schneider, Smart contracts: a killer application for deductive source code verification, Principled software development-essays dedicated to Arnd Poetzsch-Heffter on the occasion of his 60th birthday, pp.1-18, 2018.

T. Akazaki and I. Hasuo, Time robustness in MTL and expressivity in hybrid system falsification, Proceedings of the 27th Int'l conference on computer aided verification (CAV'15), vol.9207, pp.356-374, 2015.

S. Alagar and S. Venkatesan, Techniques to tackle state explosion in global predicate detection, IEEE Trans Softw Eng (TSE), vol.27, issue.8, pp.704-714, 2001.

M. Alberti, F. Chesani, M. Gavanelli, E. Lamma, P. Mello et al., Verifiable agent interaction in abductive logic programming: the SCIFF framework, ACM Trans Comput Log, vol.9, issue.4, p.43, 2008.

M. Althoff, Reachability analysis of nonlinear systems using conservative polynomialization and non-convex sets, Proceedings the 16th Int'l conference on hybrid systems computation and control (HSCC'13, pp.173-182, 2013.

R. Alur, T. Feder, and T. A. Henzinger, The benefits of relaxing punctuality, J ACM, vol.43, issue.1, pp.116-146, 1996.

D. Anicic, P. Fodor, S. Rudolph, R. Stühmer, N. Stojanovic et al., A rule-based language for complex event processing and reasoning, Proceedings of the 4th Int'l conference on web reasoning and rule systems (RR'10), vol.6333, pp.42-57, 2010.

Y. Annapureddy, C. Liu, G. Fainekos, and S. Sankaranarayanan, S-taliro: A tool for temporal logic falsification for hybrid systems, Proceedings of the 17th Int'l conference on tools and algorithms for the construction and analysis of systems (TACAS'11), vol.6605, pp.254-257, 2011.

Y. Annapureddy, Fainekos (GE) (2010) Ant colonies for temporal logic falsification of hybrid systems, Proceedings of the 36th annual conference on IEEE industrial electronics society (IECON'10)

T. Antignac, D. Sands, and G. Schneider, Data minimisation: a language-based approach, Proceedings of the 32nd IFIP TC Int'l conference on ICT system security and privacy protection (IFIP SEC'17), vol.502, pp.442-456, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01648986

C. Arackaparambil, J. Brody, and A. Chakrabarti, Functional monitoring without monotonicity, Proceedings of the 36th Int'l colloquium on automata, languages and programming: Part I (ICALP'09), vol.5555, pp.95-106, 2009.

A. Arasu, S. Babu, and J. Widom, The CQL continuous query language: semantic foundations and query execution, VLDB J, vol.15, issue.2, pp.121-142, 2006.

C. Arm and E. , ARM CoreSight Architecture Specification, 2013.

M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz et al., A view of cloud computing, Commun ACM, vol.53, issue.4, pp.50-58, 2010.

S. Arshad, A. Kharraz, and W. Robertson, Identifying extension-based ad injection via fine-grained web content provenance, Proceedings of the 19th Int'l symposium on research in attacks, intrusions, and defenses (RAID'16), vol.9854, pp.415-436, 2016.

E. Asarin, P. Caspi, and O. Maler, Timed regular expressions, J ACM, vol.49, issue.2, pp.172-206, 2002.
URL : https://hal.archives-ouvertes.fr/hal-01699969

E. Asarin, O. Maler, and A. Pnueli, Reachability analysis of dynamical systems having piecewiseconstant derivatives, Theor Comput Sci, vol.138, issue.1, pp.35-65, 1995.

E. Asarin, V. Mysore, A. Pnueli, and G. Schneider, Low dimensional hybrid systems-decidable, undecidable, don't know, Inf Comput, vol.211, pp.138-159, 2012.

E. Asarin, G. Schneider, and S. Yovine, On the decidability of the reachability problem for planar differential inclusions, 4th International workshop on hybrid systems: computation and control (HSCC'01), pp.89-104, 2001.

E. Asarin, G. Schneider, and S. Yovine, Algorithmic analysis of polygonal hybrid systems, Part I: reachability. Theor Comput Sci, vol.379, issue.1-2, pp.231-265, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00157340

D. P. Attard and A. Francalanza, A monitoring tool for a branching-time logic, Proceedings of the 16th Int'l conference on runtime verification (RV'16), vol.10012, pp.473-481, 2016.

D. P. Attard and A. Francalanza, Trace partitioning and local monitoring for asynchronous components, Proceedings of the 15th Int'l conference on software engineering and formal methods (SEFM'17), vol.10469, pp.219-235, 2017.

H. Attiya and J. L. Welch, Distributed computing: fundamentals, simulations and advanced topics, 2004.

N. Atzei, M. Bartoletti, and T. Cimoli, A survey of attacks on Ethereum smart contracts (SoK), Proceedings of the 6th Int'l conference on principles of security and trust (POST'17), vol.10204, pp.164-186, 2017.

T. H. Austin and C. Flanagan, Permissive dynamic information flow analysis, Proceedings of the workshop on programming languages and analysis for security, pp.1-12, 2010.

T. H. Austin and C. Flanagan, Multiple facets for dynamic information flow, Proceedings of the 39th ACM SIGPLAN-SIGACT Symp, on principles of programming languages (POPL'12), pp.165-178, 2012.

S. Azzopardi, J. Ellul, and G. J. Pace, Monitoring smart contracts: ContractLarva and open challenges beyond, Proceedings of the 18th Int'l conference on runtime verification (RV'18), 2018.

S. Azzopardi, G. J. Pace, F. Schapachnik, and G. Schneider, Contract automata: an operational view of contracts between interactive parties, Artif Intell Law, vol.24, issue.3, pp.203-243, 2016.

B. Babcock, S. Babu, M. Datar, R. Motwani, and J. Widom, Models and issues in data stream systems, Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS'02, pp.1-16, 2002.

B. Babcock and C. Olston, Distributed top-k monitoring, Proceedings of the 2003 ACM SIGMOD Int'l conference on management of data (SIGMOD'03), pp.28-39, 2003.

H. C. Baker and C. Hewitt, The incremental garbage collection of processes, SIGPLAN Not, vol.12, issue.8, pp.55-59, 1977.

G. Barany and J. Signoles, Hybrid information flow analysis for real-world C code, Proceedings of the 11th Int'l conference on tests and proofs (TAP'17), pp.23-40, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01658653

B. Barre, M. Klein, S. Boivin, P. Ollivier, and S. Hallé, MapReduce for parallel trace validation of LTL properties, Proceedings of the 17th Int'l conference on runtime verification (RV'12), vol.7687, pp.184-198, 2012.

E. Bartocci, E. Aydin-gol, I. Haghighi, and C. Belta, A formal methods approach to pattern recognition and synthesis in reaction diffusion networks, IEEE Trans Control Netw Syst, vol.5, issue.1, pp.308-320, 2018.

E. Bartocci, L. Bortolussi, M. Loreti, and L. Nenzi, Monitoring mobile and spatially distributed cyberphysical systems, Proceedings of the 15th ACM-IEEE international conference on formal methods and models for system design (MEMOCODE'17, pp.146-155, 2017.

E. Bartocci, L. Bortolussi, L. Nenzi, and G. Sanguinetti, System design of stochastic models using robustness of temporal properties, Theor Comput Sci, vol.587, pp.3-25, 2015.

E. Bartocci, J. V. Deshmukh, A. Donzé, G. E. Fainekos, O. Maler et al., Specification-based monitoring of cyber-physical systems: a survey on theory, tools and applications, Lectures on runtime verification-introductory and advanced topics, vol.10457, pp.135-175, 2018.

, Lectures on runtime verification-introductory and advanced topics, volume 10457 of lecture notes in computer science, 2018.

E. Bartocci, T. Ferrére, N. Manjunath, and D. Nickovic, Localizing faults in Simulink/Stateflow models with STL, Proceedings of the 21st ACM Int'l conference on hybrid systems computation and control (HSCC'18, pp.197-206, 2018.

E. Bartocci and R. Grosu, Monitoring with uncertainty, Proceedings 3rd Int'l workshop on hybrid autonomous systems, vol.124, pp.1-4, 2013.

E. Bartocci, R. Grosu, A. Karmarkar, S. A. Smolka, S. D. Stoller et al., Adaptive runtime verification, RV 2012, pp.168-182, 2012.

E. Bartocci and P. Liò, Computational modeling, formal analysis, and tools for systems biology, PLoS Comput Biol, vol.12, issue.1, p.1004591, 2016.

D. Basin, B. Bhatt, and D. Traytel, Optimal proofs for linear temporal logic on lasso words, Proceedings of the 16th Int'l symposium on automated technology for verification and analysis (ATVA'18), vol.11138, 2018.

D. Basin, G. Caronni, S. Ereth, M. Harvan, F. Klaedtke et al., Scalable offline monitoring of temporal specifications, Formal Methods Syst Des, vol.49, issue.1-2, pp.75-108, 2016.

D. Basin, F. Klaedtke, S. Marinovic, and E. Z?linescu, Monitoring compliance policies over incomplete and disagreeing logs, Proceedings of the 4th Int'l conference on runtime verification (RV'13), vol.8174, pp.151-167, 2013.

D. Basin, F. Klaedtke, and E. Zalinescu, The MonPoly monitoring tool, An international workshop on competitions, usability, benchmarks, evaluation, and standardisation for runtime verification tools, vol.3, pp.19-28, 2017.

D. Basin, S. Krsti?, and D. Traytel, Almost event-rate indepedent monitoring of metric dynamic logic, Proceedings of the 17th Int'l conference on runtime verification (RV'17), vol.10548, pp.85-102, 2017.

D. A. Basin, B. N. Bhatt, and D. Traytel, Almost event-rate independent monitoring of metric temporal logic, Proceedings of the 23rd Int'l conference on tools and algorithms for the construction and analysis of systems (TACAS'17): Part II, vol.10206, pp.94-112, 2017.

D. A. Basin, G. Caronni, S. Ereth, M. Harvan, F. Klaedtke et al., Scalable offline monitoring, Proceedings of 14th Int'l. conference on runtime verification (RV'14), vol.8734, pp.31-47, 2014.

D. A. Basin, M. Harvan, F. Klaedtke, and E. Zalinescu, MONPOLY: Monitoring usage-control policies, Proceedings of the second Int'l conference on runtime verification (RV'11), vol.7186, pp.360-364, 2011.

D. A. Basin, F. Klaedtke, S. Marinovic, and E. Zalinescu, Monitoring compliance policies over incomplete and disagreeing logs, Proceedings of the third Int'l conference on runtime verification (RV'12), vol.7687, pp.151-167, 2012.

D. A. Basin, F. Klaedtke, S. Marinovic, and E. Zalinescu, Monitoring of temporal first-order properties with aggregations, Formal Methods Syst Des, vol.46, issue.3, pp.262-285, 2015.

D. Basin, F. Klaedtke, S. Müller, and E. Z?linescu, Monitoring metric first-order temporal properties, J ACM, vol.62, issue.2, p.15, 2015.

D. A. Basin, F. Klaedtke, and E. Zalinescu, Failure-aware runtime verification of distributed systems, Proceedings of the 35th IARCS annual conference on foundations of software technology and theoretical computer science (FSTTCS'15), vol.45, pp.590-603, 2015.

D. A. Basin, F. Klaedtke, and E. Zalinescu, Runtime verification of temporal properties over out-of-order data streams, Proceedings of the 29th Int'l conference on computer aided verification (CAV'17), vol.10426, pp.356-376, 2017.

A. K. Bauer and Y. Falcone, Decentralised LTL monitoring, Proceedings of the 18th Int'l symposium on formal methods (FM'12), vol.7436, pp.85-100, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00857286

A. K. Bauer and Y. Falcone, Decentralised LTL monitoring, Formal Methods Syst Des, vol.48, issue.1-2, pp.49-93, 2016.
URL : https://hal.archives-ouvertes.fr/hal-00857286

A. K. Bauer, M. Leucker, and C. Schallhart, Runtime verification for LTL and TLTL, ACM Trans Softw Eng Methodol, vol.20, p.64, 2011.

L. Bauer, S. Cai, L. Jia, T. Passaro, M. Stroucken et al., Run-time monitoring and formal analysis of information flows in chromium, The Internet Society 69. BBC Technology. Ransomware cyber-attack threat escalating-Europol, 2015.

C. Belta, B. Yordanov, and E. A. Gol, Formal methods for discrete-time dynamical systems, 2017.

A. Bemporad and M. Morari, Control of systems integrating logic, dynamics, and constraints, Automatica, vol.35, issue.3, pp.407-427, 1999.

M. M. Bersani, D. Bianculli, C. Ghezzi, S. Krstic, and P. S. Pietro, Efficient large-scale trace checking using MapReduce, Proceedings of the 38th Int'l conference on software engineering (ICSE'16, pp.888-898, 2016.

A. Bessani, M. Santos, J. Felix, N. Neves, and M. Correia, On the efficiency of durable state machine replication, Proceedings of the 2013 USENIX conference on annual technical conference (ATC'13). USENIX Association, pp.169-180, 2013.

F. Besson, N. Bielova, and T. P. Jensen, Hybrid monitoring of attacker knowledge, Proceedings of the IEEE 29th computer security foundations symposium (CSF'16, pp.225-238, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01310572

B. Beyer and R. Ewaschuk, Monitoring distributed systems, 2016.

K. Bhargavan, N. Swamy, S. Zanella-béguelin, A. Delignat-lavaud, C. Fournet et al., Formal verification of smart contracts, Proceedings of the 2016 ACM workshop on programming languages and analysis for security (PLAS'16), pp.91-96, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01400469

D. Bianculli, C. Ghezzi, and S. Krstic, Trace checking of metric temporal logic with aggregating modalities using MapReduce, Proceedings of the 12th Int'l conference on software engineering and formal methods (SEFM'14), vol.8702, pp.144-158, 2014.

N. Bielova and T. Rezk, ) A taxonomy of information flow monitors, Proceedings of the 7th Int'l conference on principles of security and trust (POST'16), vol.9635, pp.46-67, 2016.

B. Bonakdarpour, P. Fraigniaud, S. Rajsbaum, and C. Travers, Challenges in fault-tolerant distributed runtime verification, Proceedings of the 7th Int'l symposium on leveraging applications of formal methods, verification and validation: foundational techniques (ISoLA'16): Part II, vol.9952, pp.363-370, 2016.

B. Bonakdarpour, C. Sánchez, and G. Schneider, Monitoring hyperproperties by combining static analysis and runtime verification, 8th International symposium on leveraging applications of formal methods, verification and validation-track: a broader view on verification: from static to runtime and back, vol.11245, pp.8-27, 2018.

W. J. Bolosky, D. Bradshaw, R. B. Haagens, N. P. Kusters, and P. Li, Paxos replicated state machines as the basis of a high-performance data store, Proceedings of the 8th USENIX conference on networked systems design and implementation (NSDI'11). USENIX Association, pp.141-154, 2011.

L. Bortolussi, D. Milios, and S. Guido, U-Check: Model checking and parameter synthesis under uncertainty, Proceedings of the 12th Int'l. conference on quantitative evaluation of systems (QEST'15), vol.9259, pp.89-104, 2015.

R. S. Boyer and J. S. Moore, Automated reasoning: essays in Honor of Woody Bledsoe, chapter MJRTYa fast majority vote algorithm, pp.105-117, 1991.

P. Buiras, D. Vytiniotis, and A. Russo, Hlio: Mixing static and dynamic typing for information-flow control in haskell, Proceedings of the 20th ACM SIGPLAN Int'l conference on functional programming (ICFP'15, pp.289-301, 2015.

D. Bundala and J. Ouaknine, On the complexity of temporal-logic path checking, Proceedings of 41st Int'l colloquium on automata, languages, and programming (ICALP'14). Part II, vol.8573, pp.86-97, 2014.

A. Bünzli and S. Höfler, Controlling ambiguities in legislative language, Proceedings of the Int'l workshop on controlled natural language (CNL'10), vol.7175, pp.21-42, 2010.

M. Burrows, The chubby lock service for loosely-coupled distributed systems, Proceedings of the 7th symposium on operating systems design and implementation (OSDI'06). USENIX Association, pp.335-350, 2006.

V. Buterin, A next generation smart contract and decentralized application platform. Ethereum White Paper, 2017.

J. J. Camilleri, M. R. Haghshenas, and G. Schneider, A web-based tool for analysing normative documents in English, Proceedings of the the 33rd ACM/SIGAPP symposium on applied computing-software verification and testing track (SAC-SVT'18), 2018.

J. J. Camilleri, G. J. Pace, and M. Rosner, Controlled natural language in a game for legal assistance, Proceedings of the 2nd Int'l workshop on controlled natural language (CNL'10), vol.7175, pp.137-153, 2010.

J. J. Camilleri, G. Paganelli, and G. Schneider, A CNL for contract-oriented diagrams, Proceedings of the 4th Int'l workshop on controlled natural language (CNL'14), vol.8625, pp.135-146, 2014.

P. Carbone, A. Katsifodimos, S. Ewen, V. Markl, S. Haridi et al., Apache flink TM : stream and batch processing in a single engine, IEEE Data Eng Bull, vol.38, issue.4, pp.28-38, 2015.

I. Cassar and A. Francalanza, Runtime adaptation for actor systems, Proceedings of the 6th Int'l conference on runtime verification (RV'15), vol.9333, pp.38-54, 2015.

I. Cassar and A. Francalanza, On implementing a monitor-oriented programming framework for actor systems, Proceedings of the 12th Int'l conference on integrated formal methods iFM'16, vol.9681, pp.176-192, 2016.

I. Cassar, A. Francalanza, and S. Said, Improving runtime overheads for detecter, Proceedings of the 12th Int'l workshop on formal engineering approaches to software components and architectures (FESCA'15), vol.178, pp.1-8, 2015.

M. Castro and B. Liskov, Practical byzantine fault tolerance and proactive recovery, ACM Trans Comput Syst, vol.20, issue.4, pp.398-461, 2002.

A. Cavoukian, Privacy by design: the 7 foundational principles, Information and privacy commissioner of, 2009.

A. Chakarov, S. Sankaranarayanan, and G. E. Fainekos, Combining time and frequency domain specifications for periodic signals, Proceedings of the 2nd Int'l conference on runtime verification (RV'11), vol.7186, pp.294-309, 2011.

E. Chang, Z. Manna, and A. Pnueli, Characterization of temporal property classes, Proceedings of the 19th Int'l colloquium on automata, languages and programming (ICALP'92), vol.623, pp.474-486, 1992.

H. Chauhan, V. K. Garg, A. Natarajan, and N. Mittal, A distributed abstraction algorithm for online predicate detection, Proceedings of the 32nd IEEE symposium on reliable distributed systems, (SRDS'13, pp.101-110, 2013.

F. Chen and G. Ro?u, Parametric trace slicing and monitoring, Proceedings of the 15th Int'l conference on tools and algorithms for the construction and analysis of systems (TACAS'09), vol.5505, pp.246-261, 2009.

X. Chen, E. Ábrahám, and S. Sankaranarayanan, Flow*: an analyzer for non-linear hybrid systems, Proceedings of the 25th Int'l conference on computer aided verification (CAV'13), vol.8044, pp.258-263, 2013.

M. R. Clarkson and F. B. Schneider, Hyperproperties. J Comput Secur, vol.18, issue.6, pp.1157-1210, 2010.

C. Colombo, J. Ellul, and G. J. Pace, Contracts over smart contracts: recovering from violations dynamically, Proceedings of the 8th Int'l symposium on leveraging applications of formal methods, verification and validation (ISoLA'18), 2018.

C. Colombo and Y. Falcone, Organising LTL monitors over distributed systems with a global clock, Formal Methods Syst Des, vol.49, issue.1-2, pp.109-158, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01120551

C. Colombo, A. Francalanza, R. Mizzi, and G. J. Pace, polyLarva: Runtime verification with configurable resource-aware monitoring boundaries, Proceedings of the 10th Int'l conference on software engineering and formal methods (SEFM'12), vol.7504, pp.218-232, 2012.

C. Colombo and G. J. Pace, Monitor-oriented compensation programming through compensating automata, ECEASST, vol.58, pp.1-12, 2013.

C. Colombo and G. J. Pace, Recovery within long running transactions, ACM Comput Surv, vol.45, issue.3, p.28, 2013.

C. Colombo, G. J. Pace, and P. Abela, Safer asynchronous runtime monitoring using compensations, Formal Methods Syst Des, vol.41, issue.3, pp.269-294, 2012.

R. Cooper and K. Marzullo, Consistent detection of global predicates, Proceedings of the ACM/ONR Workshop on parallel and distributed debugging (PADD '91), pp.163-173, 1991.

G. Cormode, Continuous distributed monitoring: a short survey, Proceedings of the First Int'l workshop on algorithms and models for distributed event processing (AlMoDEP'11), vol.585, pp.1-10, 2011.

G. Cormode and M. Garofalakis, Sketching streams through the net: distributed approximate query tracking, Proceedings of the 31st Int'l conference on very large data bases (VLDB'05). VLDB Endowment, pp.13-24, 2005.

G. Cormode, M. Garofalakis, P. J. Haas, and J. C. , Synopses for massive data: samples, histograms, wavelets, sketches. Found Trends Databases, vol.4, pp.1-294, 2012.

G. Cormode, M. Garofalakis, S. Muthukrishnan, and R. Rastogi, Holistic aggregates in a networked world: Distributed tracking of approximate quantiles, Proceedings of the 2005 ACM SIGMOD Int'l conference on management of data (SIGMOD'05), pp.25-36, 2005.

G. Cormode, S. Muthukrishnan, and K. Yi, Algorithms for distributed functional monitoring, ACM Trans Algorithms, vol.7, issue.2, p.20, 2011.

G. Cormode, S. Muthukrishnan, K. Yi, and Q. Zhang, Continuous sampling from distributed streams, J ACM, vol.59, issue.2, p.25, 2012.

G. Coulouris, Council of European Union. Regulation (EU) 2016/679 of the European Parliament, vol.118, pp.32016-0679, 2011.

T. Dang, A. Donzé, and O. Maler, Verification of analog and mixed-signal circuits using hybrid system techniques, Proceedings of the 5th Int'l conference on formal methods in computer-aided design (FMCAD'04), vol.3312, pp.21-36, 2004.

T. Dang, L. Guernic, C. Maler, and O. , Computing reachable states for nonlinear biological models, Proceedings of the 7th Int'l conference on computational methods in systems biology (CMSB'09), vol.5688, pp.126-141, 2009.

B. D'angelo, S. Sankaranarayanan, C. Sánchez, W. Robinson, B. Finkbeiner et al., LOLA: Runtime monitoring of synchronous systems, Proceedings of the 12th Int'l symposium of temporal representation and reasoning (TIME'05), pp.166-174, 2005.

E. D. Demaine, A. López-ortiz, and J. I. Munro, Frequency estimation of Internet packet streams with limited space, Proceedings of the 10th annual European symposium on algorithms (ESA'02), vol.2461, pp.348-360, 2002.

D. Denning, A lattice model of secure information flow, Commun ACM, vol.19, issue.5, pp.236-243, 1976.

D. Denning and P. J. Denning, Certification of programs for secure information flow, Commun ACM, vol.20, issue.7, pp.504-513, 1977.

J. V. Deshmukh, A. Donzé, S. Ghosh, J. X. Garvit, J. Seshia et al., Robust online monitoring of signal temporal logic, Formal Methods System Des, vol.51, issue.1, pp.5-30, 2017.

D. Devriese and F. Piessens, Noninterference through secure multi-execution, Proceedings of the 31st IEEE symposium on security and privacy (SP'10, pp.109-124, 2010.

R. J. Dias, V. Pessanha, and J. M. Lourenço, Precise detection of atomicity violations, Hardware and software: verification and testing, vol.7857, pp.8-23, 2013.

R. Distefano, J. C. Seco, and J. M. Lourenço, Verification of snapshot isolation in transactional memory Java programs, Proceedings of the 26th European conference on object-oriented programming, vol.7313, pp.640-664, 2012.

A. Dokhanchi, B. Hoxha, and G. E. Fainekos, On-line monitoring for temporal logic robustness, Proceedings of the 5th Int'l conference on runtime verification (RV'14), pp.231-246, 2014.

A. Donzé, Breach, a toolbox for verification and parameter synthesis of hybrid systems, Proceedings of the 22nd Int'l conference on computer aided verification (CAV'10), vol.6174, pp.167-170, 2010.

A. Donzé, T. Ferrère, and O. Maler, Efficient robust monitoring for STL, Proceedings of the 25th Int'l conference on computer aided verification (CAV'13), vol.8044, pp.264-279, 2013.

A. Donzé, B. Krogh, and A. Rajhans, Parameter synthesis for hybrid systems with an application to Simulink models, Proceedings of the 12th Int'l conference on hybrid systems: computation and control (HSCC'09), vol.5469, pp.165-179, 2009.

A. Donzé and O. Maler, Robust satisfaction of temporal logic over real-valued signals, Proceedings of the 8th Int'l conference on formal modeling and analysis of timed systems (FORMATS'10), vol.6246, pp.92-106, 2010.

A. Donzé, O. Maler, E. Bartocci, D. Ni?kovi?, R. Grosu et al., On temporal logic and signal processing, Proceedings of the 10th Int'l symposium on automated technology for verification and analysis (ATVA'12), vol.7561, pp.92-106, 2012.

C. Eisner and D. Fisman, A practical introduction to PSL. Series on integrated circuits and systems, 2006.

A. El-hokayem and Y. Falcone, Monitoring decentralized specifications, Proceedings of the 26th ACM SIGSOFT Int'l symposium on software testing and analysis, pp.125-135, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01653725

A. El-hokayem and Y. Falcone, On the monitoring of decentralized specifications semantics, properties, analysis, and simulation, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02283429

J. Ellul and G. J. Pace, Runtime verification of Ethereum smart contracts, Proceedings of the 1st Int'l workshop on blockchain dependability, 2018.

S. Elnikety, W. Zwaenepoel, and F. Pedone, Database replication using generalized snapshot isolation, Proceedings of the 24th IEEE symposium on reliable distributed systems (SRDS'05), pp.73-84, 2005.

R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi, Reasoning about knowledge, vol.4, 2003.

G. E. Fainekos and K. C. Giannakoglou, Inverse design of airfoils based on a novel formulation of the ant colony optimization method, Inverse Probl Eng, vol.11, issue.1, pp.21-38, 2003.

G. E. Fainekos, A. Girard, and G. J. Pappas, Temporal logic verification using simulation, Proceedings of the 4th Int'l conference on formal modelling and analysis of timed systems (FORMATS'06), vol.4202, pp.171-186, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00171560

G. E. Fainekos and G. J. Pappas, Robustness of temporal logic specifications for continuous-time signals, Theor Comput Sci, vol.410, issue.42, pp.4279-4291, 2009.

Y. Falcone, T. Cornebize, and J. Fernandez, Efficient and generalized decentralized monitoring of regular languages, Proceedings of 34th IFIP Int'l conference on formal techniques for distributed objects, components, and systems (FORTE'14), vol.8461, pp.66-83, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00972559

Y. Falcone, J. Fernandez, and L. Mounier, Runtime verification of safety-progress properties, Runtime verification, 9th international workshop, vol.5779, pp.40-59, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00420487

Y. Falcone, J. Fernandez, and L. Mounier, What can you verify and enforce at runtime?, Int J Softw Tools Technol Transf (STTT), vol.14, issue.3, pp.349-382, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00497350

Y. Falcone, M. Jaber, T. Nguyen, M. Bozga, and S. Bensalem, Runtime verification of componentbased systems in the BIP framework with formally-proved sound and complete instrumentation, Softw Syst Model, vol.14, issue.1, pp.173-199, 2015.
URL : https://hal.archives-ouvertes.fr/hal-00972566

P. Faymonville and M. Zimmermann, Parametric linear dynamic logic, Proceedings of the 5th Int'l symposium on games, automata, logics and formal verification (GandALF'14), vol.161, pp.60-73, 2014.

S. Feng, M. Lohrey, and K. Quaas, Path checking for MTL and TPTL over data words, Potapov I (ed) Proceedings of the 19th Int'l conference on developments in language theory (DLT'15), vol.9168, pp.326-339, 2015.

T. Ferrère, O. Maler, and D. Nickovic, Trace diagnostics using temporal implicants, Proceedings of the 13th International symposium on automated technology for verification and analysis (ATVA'15), vol.9364, pp.241-258, 2015.

T. Ferrère, O. Maler, D. Ni?kovi?, and D. Ulus, Measuring with timed patterns, Proceedings of the 27th Int'l conference on computer aided verification (CAV'15), vol.9207, pp.322-337, 2015.

P. Flajolet, E. Fusy, O. Gandouet, and F. Meunier, Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm, Proceedings of the, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00406166

P. Fraigniaud, S. Rajsbaum, and C. Travers, On the number of opinions needed for fault-tolerant run-time monitoring in distributed systems, Proceedings of the 5th Int'l conference on runtime verification (RV'14), vol.8734, pp.92-107, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01102121

A. Francalanza, A theory of monitors-(extended abstract), Proceedings of the 19th Int'l conference on foundations of software science and computation structures (FOSSACS'16), vol.9634, pp.145-161, 2016.

A. Francalanza, Consistently-detecting monitors, Proceedings of the 28th Int'l conference on concurrency theory, vol.85, pp.1-8, 2017.

A. Francalanza, L. Aceto, and A. Ingolfsdottir, Monitorability for the Hennessy-Milner logic with recursion, Formal Methods Syst Des, vol.51, issue.1, pp.87-116, 2017.

A. Francalanza, A. Gauci, and G. J. Pace, Distributed system contract monitoring, J Log Algebraic Program, vol.82, issue.5-7, pp.186-215, 2013.

A. Francalanza and M. Hennessy, A theory for observational fault tolerance, J Log Algebraic Programm, vol.73, issue.1-2, pp.22-50, 2007.

A. Francalanza and M. Hennessy, A theory of system behaviour in the presence of node and link failure, Inf Comput, vol.206, issue.6, pp.711-759, 2008.

A. Francalanza, C. A. Mezzina, and E. Tuosto, Reversible choreographies via monitoring in erlang, Proceedings of the 18th IFIP WG 6.1 Int'l conference on distributed applications and interoperable systems (DAIS'18), vol.10853, pp.75-92, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01824635

A. Francalanza, J. A. Pérez, and C. Sánchez, Runtime verification for decentralised and distributed systems, Lectures on runtime verification-introductory and advanced topics, pp.176-210, 2018.

A. Francalanza and A. Seychell, Synthesising correct concurrent runtime monitors, Formal Methods Syst Des, vol.46, issue.3, pp.226-261, 2015.

M. Fränzle, C. Herde, T. Teige, S. Ratschan, and T. Schubert, Efficient solving of large non-linear arithmetic constraint systems with complex Boolean structure, J Satisf Boolean Model Comput, vol.1, issue.3-4, pp.209-236, 2007.

G. Frehse, PHAVer: algorithmic verification of hybrid systems past HyTech, Int J Softw Tools Technol Transfer, vol.10, issue.3, pp.263-279, 2008.

G. Frehse, L. Guernic, C. Donzé, A. Cotton, S. Ray et al., SpaceEx: Scalable verification of hybrid systems, Proceedings of the 23rd Int'l conference on computer aided verification (CAV'11), vol.6806, pp.379-395, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00769608

N. E. Fuchs, Specifications are (preferably) executable, Softw Eng J, vol.7, issue.5, pp.323-334, 1992.

J. Gait, A probe effect in concurrent programs, Softw Pract Exp, vol.16, issue.3, pp.225-233, 1986.

F. Gandon, G. Governatori, and S. Villata, Normative requirements as linked data, Proceedings of the 30th annual conference on legal knowledge and information systems (JURIX'17), vol.302, pp.1-10, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01643769

R. Garcia, R. Rodrigues, and N. Preguiça, Efficient middleware for byzantine fault tolerant database replication, Proceedings of the 6th conference on computer systems (EuroSys'11), pp.107-122, 2011.

L. García-bañuelos, A. Ponomarev, M. Dumas, and I. Weber, Optimized execution of business processes on Blockchain, Proceedings of the 15th Int'l conference on business process management (BPM'17), vol.10445, pp.130-146, 2017.

D. Garg, L. Jia, and A. Datta, Policy auditing over incomplete logs: theory, implementation and applications, Proceedings of the 18th ACM conference on computer and communications security, pp.151-162, 2011.

V. K. Garg, Elements of distributed computing, 2002.

G. D. Giacomo and M. Y. Vardi, Linear temporal logic and linear dynamic logic on finite traces, Proceedings of the 23rd Int'l joint conference on artificial intelligence (IJCAI'13). IJCAI/AAAI, pp.854-860, 2013.

S. Gilbertson, , 2011.

J. A. Goguen and J. Meseguer, Security policies and security models, IEEE symposium on security and privacy, pp.11-20, 1982.

O. Goldreich, Property testing-current research and surveys, LNCS, vol.6390, 2010.

I. Gouveia and J. Rufino, Enforcing safety and security through non-intrusive runtime verification, Proceedings 1st workshop on security and dependability of critical embedded real-time systems, pp.19-24, 2016.

G. Governatori and A. Rotolo, Norm compliance in business process modeling, Proceedings of the 4th international web rule symposium: research based and industry focused (RuleML'10), pp.194-209, 2010.

R. Grigore and S. Kiefer, Selective monitoring, Proceedings 29th Int'l conference on concurrency theory (CONCUR'18), vol.118, p.16, 2018.

S. Gupta, B. H. Krogh, and R. A. Rutenbar, Towards formal verification of analog designs, Proceedings of the Int'l conference on computer-aided design (ICCAD'04), pp.210-217, 2004.

D. Gyllstrom, E. Wu, H. Chae, Y. Diao, P. Stahlberg et al., SASE: Complex event processing over streams, 2006.

I. Haghighi, A. Jones, Z. Kong, E. Bartocci, R. Grosu et al., SpaTeL: a novel spatial-temporal logic and its applications to networked systems, Proceedings of the 18th Int'l conference on hybrid systems: computation and control (HSCC'15, pp.189-198, 2015.

S. Hallé and M. Soucy-boivin, MapReduce for parallel trace validation of LTL properties, J Cloud Comput, vol.4, issue.1, p.8, 2015.

K. Havelund and A. Goldberg, Verify your runs, Proceedings of the first IFIP TC 2/WG 2.3 Conference on verified software: theories, tools, experiments (VSTTE'05), vol.4171, pp.374-383, 2005.

I. Hayes and C. B. Jones, Specifications are not (necessarily) executable, Softw Eng J, vol.4, issue.6, pp.330-338, 1989.

D. Hedin, L. Bello, and A. Sabelfeld, Value-sensitive hybrid information flow control for a Javascriptlike language, Proceedings of the IEEE 28th computer security foundations symposium (CSF'15), 2015.

, IEEE, pp.351-365

D. Hedin and A. Sabelfeld, of NATO science for peace and security series D: information and communication security, Software safety and security, vol.33, pp.319-347, 2012.

T. A. Henzinger, P. W. Kopke, A. Puri, and P. Varaiya, What's decidable about hybrid automata, pp.373-382, 1995.

M. Herlihy, V. Luchangco, M. Moir, I. Scherer, and . Wn, Software transactional memory for dynamicsized data structures, Proceedings of the 22nd ACM symposium on principles of distributed computing (PODC'03), pp.92-101, 2003.

M. Herlihy and J. Moss, Transactional memory: architectural support for lock-free data structures, SIGARCH Comput Arch News, vol.21, issue.2, pp.289-300, 1993.

S. Heule, D. Rifkin, A. Russo, and D. Stefan, The most dangerous code in the browser, 15th workshop on hot topics in operating systems (HotOS XV), 2015.

S. Hunt and D. Sands, On flow-sensitive security types, Proceedings of the 33rd ACM SIGPLAN-SIGACT symposium on principles of programming languages (POPL'06), pp.79-90, 2006.

, IEEE P1800/D6, IEEE approved draft standard for system verilog-unified hardware design, specification, and verification language, IEEE, 2012.

, IEC 62531, IEEE Std 1850 Standard for property specification language (PSL), IEEE Standards Association, 2012.

, Intel Corporation (2016) Control-flow enforcement technology preview

G. Jacob, H. Debar, and E. Filiol, Behavioral detection of malware: from a survey towards an established taxonomy, J Comput Virol, vol.4, issue.3, pp.251-266, 2008.

S. Jaksic, E. Bartocci, R. Grosu, R. Kloibhofer, T. Nguyen et al., From signal temporal logic to FPGA monitors, Proceedings of the the 13th ACM/IEEE international conference on formal methods and models for codesign (MEMOCODE'15, pp.218-227, 2015.

S. Jaksic, E. Bartocci, R. Grosu, and D. Nickovic, Quantitative monitoring of STL with edit distance, Proceedings of the 16th Int'l conference on runtime verification (RV'16), vol.10012, pp.201-218, 2016.

S. Jaksic, E. Bartocci, R. Grosu, and D. Nickovic, An algebraic framework for runtime verification, IEEE Trans CAD Integr Circuits Syst, vol.37, issue.11, pp.2233-2243, 2018.

J. Joyce, G. Lomow, K. Slind, and B. Unger, Monitoring distributed systems, ACM Trans Comput Syst, vol.5, issue.2, pp.121-150, 1987.

J. Joyce, G. Lomow, K. Slind, and B. W. Unger, Monitoring distributed systems, ACM Trans Comput Syst, vol.5, issue.2, pp.121-150, 1987.

, JURIX conferences

K. Kalajdzic, E. Bartocci, S. A. Smolka, S. D. Stoller, and R. Grosu, Runtime verification with particle filtering, Proceedings of the 4th Int'l conference on runtime verification (RV'13), vol.8174, pp.149-166, 2013.

A. Kane, Runtime monitoring for safety-critical embedded systems, 2015.

A. Kane, O. Chowdhury, A. Datta, and P. Koopman, A case study on runtime monitoring of an autonomous research vehicle (ARV) system, Proceedings of the 15th international conference on runtime verification (RV'15), vol.9333, pp.102-117, 2015.

R. M. Karp, S. Shenker, and C. H. Papadimitriou, A simple algorithm for finding frequent elements in streams and bags, ACM Trans Database Syst, vol.28, issue.1, pp.51-55, 2003.

J. R. Kenny and B. Mackin, FPGA coprocessing in multi-core architectures for DSP. Altera Corporation Application Note, 2007.

R. Keralapura, G. Cormode, and J. Ramamirtham, Communication-efficient distributed monitoring of thresholded counts, Proceedings of the 2006 ACM SIGMOD Int'l conference on management of data (SIGMOD'06, pp.289-300, 2006.

. Key, , 2017.

E. S. Kim, S. Sadraddini, C. Belta, M. Arcak, and S. A. Seshia, Dynamic contracts for distributed temporal logic control of traffic networks, Prceedings of the IEEE 56th annual conference on decision and control (CDC'17, pp.3640-3645, 2017.

S. Kong, S. Gao, W. Chen, and C. E. , dReach: ?-reachability analysis for hybrid systems, Proceedings of the 21st Int'l conference on tools and algorithms for the construction and analysis of systems (TACAS'15), vol.9035, pp.200-205, 2015.

R. Koymans, Specifying real-time properties with metric temporal logic, Real Time Syst, vol.2, issue.4, pp.255-299, 1990.

T. Kuhn, A survey and classification of controlled natural languages, J Comput Linguist, vol.40, issue.1, pp.121-170, 2014.

L. Kuhtz and B. Finkbeiner, LTL path checking is efficiently parallelizable, Proceedings of the 36th Int'l colloquium on automata, languages and programming (ICALP'09): Part II, vol.5556, pp.235-246, 2009.

L. Kuhtz and B. Finkbeiner, Efficient parallel path checking for linear-time temporal logic with past and bounds, Log Methods Comput Sci, vol.8, issue.4, pp.1-24, 2012.

L. Lamport, Time, clocks, and the ordering of events in a distributed system, Commun ACM, vol.21, issue.7, pp.558-565, 1978.

L. Lamport, The part-time parliament, ACM Trans Comput Syst, vol.16, issue.2, pp.133-169, 1998.

L. Guernic, G. Banerjee, A. Jensen, T. P. Schmidt, and D. A. , Automata-based confidentiality monitoring, Proceedings of the 11th Asian computing science conference-secure software and related issues (ASIAN'06), vol.4435, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00130210

J. C. Lee, A. S. Gardnerd, and R. Lysecky, Hardware observability framework for minimally intrusive online monitoring of embedded systems, Proceedings 18th international conference on engineering of computer based systems (ECBS'11), pp.52-60, 2011.

J. C. Lee and R. Lysecky, System-level observation framework for non-intrusive runtime monitoring of embedded systems, ACM Trans Des Autom Electron Syst, vol.20, issue.42, p.27, 2015.

L. Lessig, Code and other laws of cyberspace, 1999.

M. Leucker and C. Sánchez, Regular linear temporal logic, Proceedings of The 4th Int'l colloquium on theoretical aspects of computing (ICTAC'07), vol.4711, pp.291-305, 2007.

M. Leucker and C. Schallhart, A brief account of runtime verification, J Logi Algebraic Program, vol.78, issue.5, pp.293-303, 2009.

B. Liskov, S. Ghemawat, R. Gruber, P. Johnson, L. Shrira et al., Replication in the harp file system, Proceedings of the 13th ACM symposium on operating systems principles (SOSP'91, pp.226-238, 1991.

D. B. Lomet, Process structuring, synchronization, and recovery using atomic actions, SIGSOFT Softw Eng Notes, vol.2, issue.2, pp.128-137, 1977.

A. Lomuscio and M. J. Sergot, Deontic interpreted systems, Studia Logica, vol.75, issue.1, pp.63-92, 2003.

D. Loreti, F. Chesani, A. Ciampolini, and P. Mello, Distributed compliance monitoring of business processes over MapReduce architectures, Proceedings of the 8th ACM/SPEC Int'l conference on performance engineering companion (ICPE'17, pp.79-84, 2017.

J. M. Lourenço, R. J. Dias, J. Luís, M. Rebelo, and V. Pessanha, Understanding the behavior of transactional memory applications, Proceedings of the 7th workshop on parallel and distributed systems: testing, analysis, and debugging (PADTAD'09), pp.31-39, 2009.

D. C. Luckham, The power of events-an introduction to complex event processing in distributed enterprise systems, 2005.

T. Lundqvist and P. Stenstrom, Timing anomalies in dynamically scheduled microprocessors, Proceedings of the 20th IEEE real-time systems symposium (RTSS'99), 1999.

Q. Luo and G. Ro?u, EnforceMOP: A runtime property enforcement system for multithreaded programs, Proceedings of the 2013 Int'l symposium on software testing and analysis (ISSTA'13, pp.156-166, 2013.

O. Maler and D. Nickovic, Monitoring temporal properties of continuous signals, Proceedings of the joint Int'l conferences on formal modelling and analysis of timed systems (FORMATS'04) and formal techniques in real-time and fault-tolerant systems (FTRTFT'04), vol.3253, pp.152-166, 2004.

O. Maler and D. Nickovic, Monitoring properties of analog and mixed-signal circuits, STTT, vol.15, issue.3, pp.247-268, 2013.

A. Manjhi, V. Shkapenyuk, K. Dhamdhere, and C. Olston, Finding (recently) frequent items in distributed data streams, Proceedings of the 21st Int'l conference on data engineering (ICDE'05), pp.767-778, 2005.

A. Margara and G. Cugola, Processing flows of information: from data stream to complex event processing, Proceedings of the 5th ACM Int'l conference on distributed event-based systems (DEBS'11), 2011.

B. Meyer, Eiffel: the language, 1992.

C. Mims, All IT jobs are cybersecurity jobs now, 2017.

J. Misra and D. Gries, Finding repeated elements, Sci Comput Program, vol.2, issue.2, pp.143-152, 1982.

N. Mittal, A. Sen, and V. K. Garg, Solving computation slicing using predicate detection, IEEE Trans Parallel Distrib Syst, vol.18, issue.12, pp.1700-1713, 2007.

C. Molina-jiménez and S. K. Shrivastava, Establishing conformance between contracts and choreographies, Proceedings of the IEEE 15th conference on business informatics (CBI'13), pp.69-78, 2013.

R. Morris, Counting large numbers of events in small registers, Commun ACM, vol.21, issue.10, pp.840-842, 1978.

B. Mozafari, Approximate query engines: commercial challenges and research opportunities, Proceedings of the 2017 ACM Int'l conference on management of data (SIGMOD'17, pp.521-524, 2017.

B. Mozafari, J. Ramnarayan, S. Menon, Y. Mahajan, S. Chakraborty et al., Snappydata: a unified cluster for streaming, transactions and interactice analytics, Proceedings of the 8th biennial conference on innovative data systems research (CIDR'17), 2017.

D. G. Murray, F. Mcsherry, R. Isaacs, M. Isard, P. Barham et al., Naiad: a timely dataflow system, ACM SIGOPS 24th symposium on operating systems principles, SOSP '13, pp.439-455, 2013.

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, Bitcoin.org, 2008.

T. H. Nam, Cache memory aware priority assignment and scheduling simulation of real-time embedded systems, 2017.

H. Nazarpour, Y. Falcone, S. Bensalem, and M. Bozga, Concurrency-preserving and sound monitoring of multi-threaded component-based systems: theory, algorithms, implementation, and evaluation, Formal Asp Comput, vol.29, issue.6, pp.951-986, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01653883

J. Nelson, Sketching and streaming algorithms for processing massive data, ACM Crossroads, vol.19, issue.1, pp.14-19, 2012.

L. Nenzi, L. Bortolussi, V. Ciancia, M. Loreti, and M. Massink, Qualitative and quantitative monitoring of spatio-temporal properties, Proceedings of the 6th Int'l conference on runtime verification (RV'15), vol.9333, pp.21-37, 2015.

T. Nghiem, S. Sankaranarayanan, G. E. Fainekos, F. Ivancic, A. Gupta et al., Monte-carlo techniques for falsification of temporal properties of non-linear hybrid systems, Proceedings of the 13th ACM Int'l conference on hybrid systems: computation and control (HSCC'10, pp.211-220, 2010.

T. Nguyen, E. Bartocci, D. Ni?kovi?, R. Grosu, S. Jaksic et al., The HARMONIA project: hardware monitoring for automotive systems-of-systems, Proceedings of 7th Int'l symposium on leveraging applications of formal methods, verification and validation (ISoLA'16), vol.9953, pp.371-379, 2016.

D. Nickovic, O. Lebeltel, O. Maler, and T. Ferrere, AMT 2.0: Qualitative and quantitative trace analysis with extended signal temporal logic, Proceedings of the Int'l conference on tools and algorithms for the construction and analysis of systems (TACAS'18), vol.10806, pp.303-319, 2018.

W. Orme, Debug and trace for multicore SoCs: How to build an efficient and effective debug and trace system for complex, multicore SoCs, 2008.

L. Orosa and J. M. Lourenço, A hardware approach for detecting, exposing and tolerating high level atomicity violations, Proceedings of the 24th Euromicro Int'l conference on parallel, distributed, and network-based processing (PDP'16), pp.159-167, 2016.

G. J. Pace and G. Schneider, Challenges in the specification of full contracts, Proceedings of the 7th Int'l conference on integrated formal methods (iFM'09), vol.5423, pp.292-306, 2009.

Y. V. Pant, H. Abbas, and R. Mangharam, Smooth operator: control using the smooth robustness of temporal logic, Proceedings of the 2017 IEEE conference on control technology and applications (CCTA'17, pp.1235-1240, 2017.

R. Pardo, C. Colombo, G. Pace, and G. Schneider, An automata-based approach to evolving privacy policies for social networks, Proceedings of the 16th Int'l conference on runtime verification (RV'16), vol.10012, pp.285-301, 2016.

R. Pardo, I. Kellyérová, C. Sánchez, and G. Schneider, Specification of evolving privacy policies for online social networks, Proceedings of the 23rd international symposium on temporal representation and reasoning (TIME'16), pp.70-79, 2016.

R. Pardo, C. Sánchez, and G. Schneider, Timed epistemic knowledge bases for social networks, Proceedings of the 22nd Int'l symposium on formal methods (FM'18), vol.10951, pp.185-202, 2018.

R. Pardo and G. Schneider, A formal privacy policy framework for social networks, 12th International conference on software engineering and formal methods (SEFM'14), vol.8702, pp.378-392, 2014.

G. O. Passmore and D. Ignatovich, Formal verification of financial algorithms, Proceedings of the 26th Int'l conference on automated deduction (CADE'17), vol.10395, pp.26-41, 2017.

P. Patel, D. Bansal, L. Yuan, A. Murthy, A. Greenberg et al., Ananta: cloud scale load balancing, Proceedings of the ACM SIGCOMM 2013 conference (SIGCOMM '13), SIGCOMM '13. ACM, pp.207-218, 2013.

R. Pellizzoni, P. Meredith, M. Caccamo, and G. Rosu, Hardware runtime monitoring for dependable COTS-based real-time embedded systems, Proceedings of the IEEE real-time systems symposium (RTSS'08), pp.481-491, 2008.

L. Phan, I. Lee, and O. Sokolsky, A semantic framework for mode change protocols, Proceedings of the 17th IEEE real-time and embedded technology and applications symposium (RTAS'11), pp.91-100, 2011.

P. Picazo-sánchez, G. Schneider, and J. Tapiador, After you, please: browser extensions order attacks and countermeasures. CoRR -arXiv.org, 2019.

L. Pike, S. Niller, and N. Wegmann, Runtime verification for ultra-critical systems, Proceedings of the 2nd Int'l conference on runtime verification (RV'11), vol.7186, pp.310-324, 2011.

S. Pinisetty, D. Sands, and G. Schneider, Runtime verification of hyperproperties for deterministic programs, Proceedings of the 6th Int'l conference on formal methods in software engineering (For-maliSE'18), 2018.

R. C. Pinto and J. Rufino, Towards non-invasive runtime verification of real-time systems, Proceedings of the 26th Euromicro conference on real-time systems-WIP session, pp.25-28, 2014.

A. Pnueli and A. Zaks, PSL model checking and run-time verification via testers, Proceedings of the 14th Int'l symposium on formal methods (FM'06), vol.4085, pp.573-586, 2006.

H. Prakken and G. Sartor, Formalising arguments about norms, Proceedings of the 26th annual conference on legal knowledge and information systems (JURIX'13), vol.259, pp.121-130, 2013.

C. Prisacariu and G. Schneider, A dynamic deontic logic for complex contracts, J Log Algebraic Program, vol.81, issue.4, pp.458-490, 2012.

C. Prybila, S. Schulte, C. Hochreiner, and I. Weber, Runtime verification for business processes utilizing the Bitcoin Blockchain, 2017.

M. Rahmatian, H. Kooti, I. G. Harris, and E. Bozorgzadeh, Adaptable intrusion detection using partial runtime reconfiguration, Proceedings of the IEEE 30th Int'l conference on computer design (ICCD'12), pp.147-152, 2012.

V. Raman, A. Donzé, M. Maasoumy, M. Rm, A. Sangiovanni-vincentelli et al., Model predictive control with signal temporal logic specifications, Proceedings of the 53rd annual conference on decision and control (CDC'14, pp.81-87, 2014.

V. Raman, A. Donzé, D. Sadigh, R. M. Murray, and S. A. Seshia, Reactive synthesis from signal temporal logic specifications, Proceedings HSCC'15: the 18th international conference on hybrid systems: computation and control, pp.239-248, 2015.

K. Ravichandran, A. Gavrilovska, and S. Pande, DeSTM: harnessing determinism in STMs for application development, Proceedings of the Int'l conference on parallel architectures and compilation (PACT), pp.213-224, 2014.

G. Reger and D. Rydeheard, From first-order temporal logic to parametric trace slicing, Proceedings of the 6th Int'l conference on runtime verification (RV'15), pp.216-232, 2015.

T. Reinbacher, M. Fugger, and J. Brauer, Runtime verification of embedded real-time systems, Formal Methods Syst Des, vol.24, issue.3, pp.203-239, 2014.

T. Reinbacher, K. Y. Rozier, and J. Schumann, Temporal-logic based runtime observer pairs for system health management of real-time systems, Proceedings 20th international conference on tools and algorithms for the construction and analysis of systems (TACAS'14), vol.8413, pp.357-372, 2014.

J. Reinders, Reliable smart contracts: State-of-the-art, applications, challenges and future directions, Isola2018-SmartContracts. ISoLA'18 track, 2013.

A. Rizk, G. Batt, F. Fages, and S. Soliman, On a continuous degree of satisfaction of temporal logic formulae with applications to systems biology, Proceedings of the 6th Int'l conference on computational methods in systems biology (CMSB'08), vol.5307, pp.251-268, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00419781

A. Rodionova, E. Bartocci, D. Ni?kovi?, and R. Grosu, Temporal logic as filtering, Proceedings of HSCC 2016: the 19th International conference on hybrid systems: computation and control, pp.11-20, 2016.

J. Rufino, Towards integration of adaptability and non-intrusive runtime verification in avionic systems, ACM SIGBED Rev, vol.13, issue.1, pp.60-65, 2016.

J. Rufino and I. Gouveia, Timeliness runtime verification and adaptation in avionic systems, Proceedings of the 12th workshop on operating systems platforms for embedded real-time applications (OSPERT'16), pp.14-20, 2016.

A. Russo and A. Sabelfeld, Dynamic vs. static flow-sensitive security analysis, Proceedings of the 23rd IEEE computer security foundations symposium (CSF'10), pp.186-199, 2010.

A. Sabelfeld and A. C. Myers, Language-based information-flow security, J Sel Areas Commun, vol.21, issue.1, pp.5-19, 2003.

A. Saini, M. S. Gaur, V. Laxmi, and M. Conti, Colluding browser extension attack on user privacy and its implication for web browsers, Comput Secur, vol.63, pp.14-28, 2016.

M. B. Salem, S. Hershkop, and S. J. Stolfo, A survey of insider attack detection research, Insider attack and cyber security-beyond the hacker, pp.69-90, 2008.

C. Sánchez and M. Leucker, Regular linear temporal logic with past, Proceedings of the 11th Int'l conference on verification, model checking, and abstract interpretation, vol.5944, pp.295-311, 2010.

J. F. Santos, T. Jensen, T. Rezk, and A. Schmitt, Hybrid Typing of Secure Information Flow in a JavaScriptlike Language, Proceedings of the 10th Int'l symposium on on trustworthy global computing (TGC'15), vol.9533, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01243029

F. B. Schneider, Implementing fault-tolerant services using the state machine approach: a tutorial, ACM Comput Surv, vol.22, issue.4, pp.299-319, 1990.

N. P. Schultz-møller, M. Migliavacca, and P. Pietzuch, Distributed complex event processing with query rewriting, Proceedings of the 3rd ACM Int'l conference on distributed event-based systems (DEBS'09, vol.4, p.12, 2009.

K. Selyunin, S. Jaksic, T. Nguyen, C. Reidl, U. Hafner et al., Runtime monitoring with recovery of the SENT communication protocol, Proceedings of the the 29th Int'l conference on computer aided verification (CAV'17), vol.10426, pp.336-355, 2017.

K. Sen, A. Vardhan, G. Agha, and G. Rosu, Efficient decentralized monitoring of safety in distributed systems, Proceedings of 26th Int'l conference on software engineering (ICSE, pp.418-427, 2004.

A. Shabtai, Y. Elovici, and L. Rokach, A survey of data leakage detection and prevention solutions. Springer briefs in computer science, 2012.

J. Shekita and S. Tata, Using Paxos to build a scalable, consistent, and highly available datastore, Proc VLDB Endow, vol.4, issue.4, pp.243-254, 2011.

M. E. Shobaki and L. Lindh, A hardware and software monitor for high-level system-on-chip verification, Proceedings of the 2nd IEEE Int'l symposium on quality electronic design, pp.56-61, 2001.

W. Spoth, B. S. Arab, E. S. Chan, G. Dieter, A. Ghoneimy et al., Adaptive schema databases, Proceedings of the 8th biennial Int'l on innovative data systems research (CIDR'17, 2017.

S. D. Stoller, E. Bartocci, J. Seyster, R. Grosu, K. Havelund et al., Runtime verification with state estimation, Proceedings of the 2nd Int'l conference on runtime verification (RV'11), vol.7186, pp.193-207, 2011.

M. Suiche, WannaCry-the largest ransom-ware infection in history, 2017.

N. Szabo, Smart contracts: building blocks for digital markets, Extropy, vol.16, 1996.

T. Todman, S. Stilkerich, and W. Luk, In-circuit temporal monitors for runtime verification of reconfigurable designs, Proceedings of the 52nd annual design automation conference (DAC'15, vol.50, pp.1-50, 2015.

P. Tsankov, S. Marinovic, M. T. Dashti, and D. A. Basin, Decentralized composite access control, Proceedings of the 3rd Int'l conference principles of security and trust (POST'14), vol.8414, pp.245-264, 2014.

D. Ulus, T. Ferrère, E. Asarin, and O. Maler, Timed pattern matching, Proceedings of the 12th Int'l conference on Formal modeling and analysis of timed systems (FORMATS'14), vol.8711, pp.222-236, 2014.

D. Ulus, T. Ferrère, E. Asarin, and O. Maler, Online timed pattern matching using derivatives, Proceedings of TACAS'16, vol.9636, pp.736-751, 2016.

N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni et al., Rifle: An architectural framework for user-centric information-flow security, Proceedings of the 37th Int'l symposium on microarchitecture (MICRO'04), pp.243-254, 2004.

T. M. Vale, J. A. Silva, R. J. Dias, and J. M. Lourenço, Pot: Deterministic transactional execution, ACM Trans Arch Code Optim, vol.13, issue.4, p.24, 2016.

W. Van-der-aalst, Distributed process discovery and conformance checking, Proceedings of the 15th Int'l conference on fundamental approaches to software engineering (FASE'12), vol.7212, pp.1-25, 2012.

M. Y. Vardi, Church and Prior to PSL. In: 25 Years of model checking-history, achievements, perspectives, LNCS. Springer, vol.5000, pp.150-171, 2008.

M. Viswanathan, Foundations for the run-time analysis of software systems, 2000.

D. Volpano, C. Irvine, and G. Smith, A sound type system for secure flow analysis, J Comput Secur, vol.4, issue.2-3, pp.167-187, 1996.

C. Watterson and D. Heffernan, Runtime verification and monitoring of embedded systems, IET Softw, vol.1, issue.5, pp.172-179, 2007.

I. Weber, X. Xu, R. Riveret, G. Governatori, A. Ponomarev et al., Untrusted business process monitoring and execution using Blockchain, Proceedings of the 14th Int'l conference on business process management (BPM'16), vol.9850, pp.329-347, 2016.

S. A. Weil, S. A. Brandt, E. L. Miller, D. Long, and C. Maltzahn, Ceph: a scalable, high-performance distributed file system, Proceedings of the 7th symposium on operating systems design and implementation (OSDI'06), OSDI '06. USENIX Association, pp.307-320, 2006.

W. White, M. Riedewald, J. Gehrke, and A. Demers, What is "next" in event processing, Proceedings of the 26th ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS'07), 2007.

R. Wilhelm, J. Engblom, A. Ermedahl, N. Holsti, S. Thesing et al., The worst-case execution time problem-overview of methods and survey of tools, ACM Trans Embed Comput Syst, vol.7, issue.3, p.36, 2008.

T. Wongpiromsarn, U. Topcu, and R. M. Murray, Receding horizon temporal logic planning, IEEE Trans Autom Control, vol.57, issue.11, pp.2817-2830, 2012.

G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, vol.151, pp.1-32, 2014.

D. P. Woodruff and Q. Zhang, Tight bounds for distributed functional monitoring, Proceedings of the 44th annual acm symposium on theory of computing (STOC'12), pp.941-960, 2012.

G. Wright, Deontic logic. Mind, vol.60, pp.1-15, 1951.

A. Z. Wyner, From the language of legislation to executable logic programs, Logic in the theory and practice of lawmaking, vol.2, pp.409-434, 2015.

A. Z. Wyner, K. Angelov, G. Barzdins, D. Damljanovic, B. Davis et al., On controlled natural languages: properties and prospects, CNL'09, vol.5972, pp.281-289, 2009.

J. Xiaoqing, A. Donzé, J. V. Deshmukh, and S. A. Seshia, Mining Requirements from closed-loop control models, Proceedings of the ACM international conference on hybrid systems: computation and control (HSCC'13, pp.43-52, 2013.

C. Xie, C. Su, M. Kapritsos, Y. Wang, N. Yaghmazadeh et al., Salt: combining ACID and BASE in a distributed database, Proceedings of the 11th USENIX conference on operating systems design and implementation (OSDI'14). USENIX Association, pp.495-509, 2014.

C. Xie, C. Su, C. Littley, L. Alvisi, M. Kapritsos et al., High-performance ACID via modular concurrency control, Proceedings of the 25th symposium on operating systems principles (SOSP'15), 2015.

S. Yaghoubi and G. Fainekos, Hybrid approximate gradient and stochastic descent for falsification of nonlinear systems, Proceedings the 2017 American control conference (ACC'17, pp.529-534, 2017.

H. Yang, B. Hoxha, and G. Fainekos, Querying parametric temporal logic properties on embedded systems, Proceedings of the 24th IFIP WG 6.1 Int'l conference on testing software and systems (ICTSS'12), vol.7641, pp.136-151, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01482426

J. Yang, T. Hance, T. H. Austin, A. Solar-lezama, C. Flanagan et al., ) Precise, dynamic information flow for database-backed applications, Proceedings of the 37th ACM SIGPLAN conference on programming language design and implementation (PLDI'16, pp.631-647, 2016.

Y. Ye, T. Li, D. Adjeroh, and S. S. Iyengar, A survey on malware detection using data mining techniques, ACM Comput Surv, vol.50, issue.3, 2017.

K. Yi and Q. Zhang, Optimal tracking of distributed heavy hitters and quantiles, Algorithmica, vol.65, issue.1, pp.206-223, 2013.

B. Yu, Z. Duan, C. Tian, and N. Zhang, Verifying temporal properties of programs: a parallel approach, J Parallel Distrib Comput, vol.118, pp.89-99, 2017.

M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica, Spark: Cluster computing with working sets, Proceedings of the 2nd USENIX Workshop on hot topics in cloud computing (HotCloud'10). USENIX Association, 2010.

, Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations