Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/93819
Title: | Dynamic automata in LARVA |
Authors: | Cassar, John Paul (2010) |
Keywords: | Neural networks (Computer science) Computer programs -- Verification Computer software -- Verification |
Issue Date: | 2010 |
Citation: | Cassar, J. P. (2010). Dynamic automata in LARVA (Bachelor's dissertation). |
Abstract: | Computer systems are today, more than ever, present in our daily lives. They are increasingly becoming larger, and more sophisticated, thus bringing about an increased level of possible execution paths and environment configurations, which ultimately makes them more error prone. On the other hand, people continue to expect these softwares to guarantee their reliability and availability at all times. As such, it is becoming evident that testing alone can not provide the required guarantees, and therefore many developers are turning onto dynamic software verification to be able to provide a higher quality assurance. In this document, we present dLarva, which is an extension of the runtime verification tool LARVA. ..While LARVA already supports dynamic automaton creation, thanks to its underlying DATE (Dynamic Automata with Timers and Events) architecture, dLarva introduces support for on-the-fly state generating automata. This will make it possible to use runtime verification with an infinite state property (automaton) which brings about numerous advantages such as always having a concise representation of the property and its state at hand. Moreover, we posit that in certain cases, it could be easier to specify a dynamic automaton by specifying its transition function rather than specifying an equivalent static automaton which would need to be statically derived from its (possibly natural) dynamic definition. To demonstrate the possibilities of dLarva, we provide an implementation of LARVA/dLarva that accepts properties using a rather simple regular expression which are evaluated at run-time using derivatives. Then, we provide a simple case scenario where regular expressions are used to implement a rule-based intrusion detection system for the AnomicFTPD FTP server. |
Description: | B.Sc. IT (Hons)(Melit.) |
URI: | https://www.um.edu.mt/library/oar/handle/123456789/93819 |
Appears in Collections: | Dissertations - FacICT - 2010 Dissertations - FacICTCS - 2010-2015 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
B.SC.(HONS)IT_Cassar_John Paul_2010.PDF Restricted Access | 4.86 MB | Adobe PDF | View/Open Request a copy |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.