Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/93819
Title: Dynamic automata in LARVA
Authors: Cassar, John Paul (2010)
Keywords: Neural networks (Computer science)
Computer programs -- Verification
Computer software -- Verification
Issue Date: 2010
Citation: Cassar, J. P. (2010). Dynamic automata in LARVA (Bachelor's dissertation).
Abstract: Computer systems are today, more than ever, present in our daily lives. They are increasingly becoming larger, and more sophisticated, thus bringing about an increased level of possible execution paths and environment configurations, which ultimately makes them more error prone. On the other hand, people continue to expect these softwares to guarantee their reliability and availability at all times. As such, it is becoming evident that testing alone can not provide the required guarantees, and therefore many developers are turning onto dynamic software verification to be able to provide a higher quality assurance. In this document, we present dLarva, which is an extension of the runtime verification tool LARVA. ..While LARVA already supports dynamic automaton creation, thanks to its underlying DATE (Dynamic Automata with Timers and Events) architecture, dLarva introduces support for on-the-fly state generating automata. This will make it possible to use runtime verification with an infinite state property (automaton) which brings about numerous advantages such as always having a concise representation of the property and its state at hand. Moreover, we posit that in certain cases, it could be easier to specify a dynamic automaton by specifying its transition function rather than specifying an equivalent static automaton which would need to be statically derived from its (possibly natural) dynamic definition. To demonstrate the possibilities of dLarva, we provide an implementation of LARVA/dLarva that accepts properties using a rather simple regular expression which are evaluated at run-time using derivatives. Then, we provide a simple case scenario where regular expressions are used to implement a rule-based intrusion detection system for the AnomicFTPD FTP server.
Description: B.Sc. IT (Hons)(Melit.)
URI: https://www.um.edu.mt/library/oar/handle/123456789/93819
Appears in Collections:Dissertations - FacICT - 2010
Dissertations - FacICTCS - 2010-2015

Files in This Item:
File Description SizeFormat 
B.SC.(HONS)IT_Cassar_John Paul_2010.PDF
  Restricted Access
4.86 MBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.