Decentralized LTL Enforcement

@inproceedings{Gallay2021DecentralizedLE,
  title={Decentralized LTL Enforcement},
  author={Florian Gallay and Yli{\`e}s Falcone},
  booktitle={International Symposium on Games, Automata, Logics and Formal Verification},
  year={2021}
}
We consider the runtime enforcement of Linear-time Temporal Logic formulas on decentralized systems with no central observation point nor authority. A so-called enforcer is attached to each system component and observes its local trace. Should the global trace violate the specification, the enforcers coordinate to correct their local traces. We formalize the decentralized runtime enforcement problem and define the expected properties of enforcers, namely soundness, transparency and optimality… 
1 Citations

Decentralised Runtime Verification of Timed Regular Expressions

This work introduces the first monitoring framework for timed properties described by timed regular expressions over a distributed network of monitors, giving insights on the cost of the centralised and decentralised settings and when to best use each of them.

References

SHOWING 1-10 OF 33 REFERENCES

The temporal logic of programs

  • A. Pnueli
  • Computer Science
    18th Annual Symposium on Foundations of Computer Science (sfcs 1977)
  • 1977
A unified approach to program verification is suggested, which applies to both sequential and parallel programs. The main proof method suggested is that of temporal reasoning in which the time

Online Shielding for Stochastic Systems

A method to develop trustworthy reinforcement learning systems that automatically synthesize a correct-by-construction runtime enforcer, called a shield, that blocks all actions that are unsafe with respect to a temporal logic specification from the agent.

Decentralized runtime enforcement for robotic swarms

A macro-micro property enforcing framework with the notion of agent shields and a discrete- time enforcing mechanism called D-time enforcing is introduced and the effectiveness of the method is evaluated with experiments on specific unmanned aerial vehicle swarm tasks.

Runtime enforcement of timed properties using games

A complete theoretical framework for synthesising runtime enforcement of timed properties with uncontrollable events, modelling the runtime enforcement problem as a Büchi game and presenting GREP, a tool implementing this approach.

Lectures on Runtime Verification: Introductory and Advanced Topics

The aim is to train the researchers from academia and industry introducing them first to the basic concepts and then to the advanced topics of this exciting research area, as well as to the first of a series of Schools on RV.

On the Monitoring of Decentralized Specifications Semantics, Properties, Analysis, and Simulation

This work proposes a data-structure that keeps track of the execution of an automaton, has predictable parameters and size, and guarantees strong eventual consistency and introduces THEMIS, a framework for designing decentralized algorithms and simulating their behavior.

A taxonomy for classifying runtime verification tools

This work classify RV tools within a high-level taxonomy of concepts and surveys the existing RV tools and, where possible with the support of tool authors, classify them according to the taxonomy.

On the Monitoring of Decentralized Specifications

This work introduces two complementary approaches to monitor decentralized systems and presents THEMIS, a framework for designing such decentralized algorithms and simulating their behavior, and presents a general algorithm for monitoring decentralized specifications.

Runtime enforcement of timed properties revisited

A new enforcement paradigm where enforcement mechanisms are time retardants: to produce a correct output sequence, additional delays are introduced between the events of the input sequence and two new features are introduced, physical constraints that describe how a time retardant is physically constrained when delaying a sequence of timed events.

Runtime enforcement of regular timed properties by suppressing and delaying events