Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/93819
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2022-04-14T12:35:02Z-
dc.date.available2022-04-14T12:35:02Z-
dc.date.issued2010-
dc.identifier.citationCassar, J. P. (2010). Dynamic automata in LARVA (Bachelor's dissertation).en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/93819-
dc.descriptionB.Sc. IT (Hons)(Melit.)en_GB
dc.description.abstractComputer systems are today, more than ever, present in our daily lives. They are increasingly becoming larger, and more sophisticated, thus bringing about an increased level of possible execution paths and environment configurations, which ultimately makes them more error prone. On the other hand, people continue to expect these softwares to guarantee their reliability and availability at all times. As such, it is becoming evident that testing alone can not provide the required guarantees, and therefore many developers are turning onto dynamic software verification to be able to provide a higher quality assurance. In this document, we present dLarva, which is an extension of the runtime verification tool LARVA. ..While LARVA already supports dynamic automaton creation, thanks to its underlying DATE (Dynamic Automata with Timers and Events) architecture, dLarva introduces support for on-the-fly state generating automata. This will make it possible to use runtime verification with an infinite state property (automaton) which brings about numerous advantages such as always having a concise representation of the property and its state at hand. Moreover, we posit that in certain cases, it could be easier to specify a dynamic automaton by specifying its transition function rather than specifying an equivalent static automaton which would need to be statically derived from its (possibly natural) dynamic definition. To demonstrate the possibilities of dLarva, we provide an implementation of LARVA/dLarva that accepts properties using a rather simple regular expression which are evaluated at run-time using derivatives. Then, we provide a simple case scenario where regular expressions are used to implement a rule-based intrusion detection system for the AnomicFTPD FTP server.en_GB
dc.language.isoenen_GB
dc.rightsinfo:eu-repo/semantics/restrictedAccessen_GB
dc.subjectNeural networks (Computer science)en_GB
dc.subjectComputer programs -- Verificationen_GB
dc.subjectComputer software -- Verificationen_GB
dc.titleDynamic automata in LARVAen_GB
dc.typebachelorThesisen_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.publisher.institutionUniversity of Maltaen_GB
dc.publisher.departmentFaculty of Information and Communication Technology. Department of Computer Scienceen_GB
dc.description.reviewedN/Aen_GB
dc.contributor.creatorCassar, John Paul (2010)-
Appears in Collections:Dissertations - FacICT - 2010
Dissertations - FacICTCS - 2010-2015

Files in This Item:
File Description SizeFormat 
B.SC.(HONS)IT_Cassar_John Paul_2010.PDF
  Restricted Access
4.86 MBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.