{"title":"私有运行时验证:正在进行的工作","authors":"Houssam Abbas","doi":"10.1145/3349568.3351552","DOIUrl":null,"url":null,"abstract":"Complex systems require runtime monitoring of their operation, and this task can be performed by a separate monitoring process. A hacked monitor however could use the system traces it receives to attack the system or leak the information to competitors. We introduce private runtime verification, in which the monitoring process learns nothing about the traces, and yet is still able to correctly monitor them for satisfaction of temporal specifications.","PeriodicalId":233835,"journal":{"name":"Proceedings of the International Conference on Embedded Software Companion","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Private runtime verification: work-in-progress\",\"authors\":\"Houssam Abbas\",\"doi\":\"10.1145/3349568.3351552\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Complex systems require runtime monitoring of their operation, and this task can be performed by a separate monitoring process. A hacked monitor however could use the system traces it receives to attack the system or leak the information to competitors. We introduce private runtime verification, in which the monitoring process learns nothing about the traces, and yet is still able to correctly monitor them for satisfaction of temporal specifications.\",\"PeriodicalId\":233835,\"journal\":{\"name\":\"Proceedings of the International Conference on Embedded Software Companion\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the International Conference on Embedded Software Companion\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3349568.3351552\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the International Conference on Embedded Software Companion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3349568.3351552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Complex systems require runtime monitoring of their operation, and this task can be performed by a separate monitoring process. A hacked monitor however could use the system traces it receives to attack the system or leak the information to competitors. We introduce private runtime verification, in which the monitoring process learns nothing about the traces, and yet is still able to correctly monitor them for satisfaction of temporal specifications.