skip to main content
research-article

On the expressiveness and complexity of randomization in finite state monitors

Authors Info & Claims
Published:21 August 2009Publication History
Skip Abstract Section

Abstract

In this article, we introduce the model of finite state probabilistic monitors (FPM), which are finite state automata on infinite strings that have probabilistic transitions and an absorbing reject state. FPMs are a natural automata model that can be seen as either randomized run-time monitoring algorithms or as models of open, probabilistic reactive systems that can fail. We give a number of results that characterize, topologically as well as with respect to their computational power, the sets of languages recognized by FPMs. We also study the emptiness and universality problems for such automata and give exact complexity bounds for these problems.

References

  1. Alpern, B., and Schneider, F. 1985. Defining liveness. Inf. Proc. Lett. 21, 181--185.Google ScholarGoogle ScholarCross RefCross Ref
  2. Amorium, M., and Rosu, G. 2005. Efficient monitoring of omega-languages. In Proceedings of the International Conference on Computer Aided Verification'. Lecture Notes in Computer Science, vol. 3576. Springer-Verlag, Berlin, 364--378. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Baier, C., Bertrand, N., and Größer, M. 2008. On decision problems for probabilistic Büchi automata. In Proceedings of the 11th International Conference on Foundations of Software Science and Computational Structures. Lecture Notes in Computer Science. Springer-Verlag, Berlin, Germany (FoSSaCS). 287--301. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Baier, C. and Größer, M. 2005. Recognizing ω-regular languages with probabilistic automata. In Proceedings of the IEEE Symposium on Login in Computer Science. IEEE Computer Society Press, Los Alamitos, 137--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bauer, A., Leucker, M., and Schallhart, C. 2006. Monitoring of real-time properties. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science. Springer-Verlag, Berlin, Germany, 260--272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Chadha, R., Sistla, A. P., and Viswanathan, M. 2008. On the expressiveness and complexity of randomization in finite state monitors. In Proceedings of the 23rd Annual IEEE Symposium on Logic in Computer Science (LICS 2008). IEEE Computer Society Press, Los Alamitos, 18--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Chen, F., and Rosu, G. 2007. MOP: An efficient and generic runtime verification framework. In Proceedings of the ACM International Conference on Object-Oriented Programming, Systems, Languages, and Applications. ACM, New York, 569--588. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Condon, A., and Lipton, R. J. 1989. On the complexity of space bounded interactive proofs (extended abstract). In Proceedings of the 30th Annual Symposium on Foundations of Computer Science. IEEE Computer Society, Press Los Alamitos, 462--467. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Diaz, M., Juanole, G., and Courtiat, J. P. 1994. Observer: A concept for formal on-line validation of distributed systems. IEEE Trans. Softw. Eng. 20, 12, 900--913. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Freivalds, R. 1981. Probabilistic two-way machines. In Proceeding of the Mathematical Foundations of Computer Science. Springer-Verlag, Berlin, Germany, 33--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gates, A., and Roach, S. 2001. Dynamics: Comprehensive support for runtime monitoring. In Runtime Verification. ENTCS. Elsevier Publishing, Amsterdam, The Netherlands.Google ScholarGoogle Scholar
  12. Gondi, K., Patel, Y., and Sistla, A. P. 2009. Monitoring the full range of omega-regular properties of stochastic systems. In Proceedings of International Conference on Verification, Model Checking and Abstract Interpretation. Lecture Notes in Computer Science, vol. 5403. Springer-Verlag, Berlin, Germany, 105--119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Hamlen, K. W., Morrisett, G., and Schneider, F. 2006. Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28, 1, 175--205. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Havelund, K., and Rosu, G. 2001. Monitoring java programs with JavaPathExplorer. In Runtime Verification. ENTCS. Elsevier Publishing, Amesterdam, The Netherlands.Google ScholarGoogle Scholar
  15. Immerman, N. 1988. Nondeterministic space is closed under complementation. SIAM J. Comput. 17, 935--938. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jeffery, C., Zhou, W., Templer, K., and Brazell, M. 1998. A lightweight architechture for program execution monitoring. In Proceedings of the ACM Workshop on Program Analysis for Software Tools and Engineering. ACM, New York, 67--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kemeny, J., and Snell, J. 1976. Denumerable Markov Chains. Springer-Verlag, Berlin, Germany.Google ScholarGoogle Scholar
  18. Kim, M., Viswanathan, M., B.-Abdullah, H., Kannan, S., Lee, I., and Sokolsky, O. 1999. Formally specified monitoring of temporal properties. In Proceedings of the IEEE Euromicro Conference on Real-time Systems. IEEE Computer Society Press, Los Alamitos, 114--122.Google ScholarGoogle Scholar
  19. Kortenkamp, D., Milam, T., Simmons, R., and Fernandez, J. L. 2001. Collecting and analyzing data from distributed control programs. In Runtime Verification. ENTCS. Elsevier Publishing, Amesterdam, The Netherlands.Google ScholarGoogle Scholar
  20. Lamport, L. 1985. Logical foundation, distributed systems: Methods and tools for specification. Lecture Notes in Computer Science, vol. 190. Springer-Verlag, Berlin, Germany. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Ligatti, J. 2006. Policy enforcement via program monitoring. Ph.D. dissertation, Princeton Univ., Princeton. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ligatti, J., Bauer, L., and Walker, D. 2005. Edit automata: Enforcement mechanisms for runtime security policies. Int. J. Inf. Sec. 4, 1--2 (Feb.), 2--16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Ligatti, J., Bauer, L., and Walker, D. 2009. Runtime enforcement of nonsafety policy. ACM Trans. Inf. Syst. Sec. 12, 3, 1--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Mansouri-Samani, M., and Sloman, M. 1992. Monitoring distributed systems: A survey. Res. Rep. DOC92/93, Imperial College, London, UK.Google ScholarGoogle Scholar
  25. Margaria, T., Sistla, A. P., Steffen, B., and Zuck, L. D. 2005. Taming interface specifications. In Proceedings of 16th International Conference on Concurrency Theory (CONCUR). Springer-Verlag, Berlin, Germany, 548--561. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Nasu, M., and Honda, N. 1968. Fuzzy events realized by finite probabilistic automata. Inf. Cont. 12, 4, 284--303.Google ScholarGoogle ScholarCross RefCross Ref
  27. Papoulis, A., and Pillai, S. U. 2002. Probability, Random Variables and Stochastic Processes. McGraw Hill, New York.Google ScholarGoogle Scholar
  28. Paxson, V. 1997. Automated packet trace analysis of TCP implementations. Computer Commun. Rev. 27, 4, 167--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Paz, A. 1971. Introduction to Probabilistic Automata. Academic Press, Orlando. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Perrin, D., and Pin, J.-E. 2004. Infinite Words: Automata, Semigroups, Logic and Games. Elseiver, Amesterdam, The Netherlands.Google ScholarGoogle Scholar
  31. Plattner, B., and Nievergelt, J. 1981. Monitoring program execution: A survey. IEEE Comput. 14, 1 (Nov.), 76--93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Pnueli, A., and Zaks, A. 2006. PSL model checking and runtime verification via testers. In Proceedings of the 14th International Symposium on Formal Methods. Springer-Verlag, Berlin Germany, 573--586. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Rabin, M. O. 1963. Probabilitic automata. Inf. Cont. 6, 3, 230--245.Google ScholarGoogle ScholarCross RefCross Ref
  34. Ranum, M. J., Landfield, K., Stolarchuk, M., Sienkiewicz, M., Lambeth, A., and Wall, E. 1997. Implementing a generalized tool for network monitoring. In Proceedings of the Systems Administration Conference. USENIX Association, 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Salomaa, A. 1973. Formal Languages. Academic Press, Orlando. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Sammapun, U., Lee, I., Sokolsky, O., and Regehr, J. 2007. Statistical runtime checking of probabilistic properties. In Proceedings of the 7th International Workshop on Runtime Verification. Springer-Verlag, Berlin, Germany, 164--175. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Schneider, F. B. 2000. Enforceable security policies. ACM Trans. Inf. Syst. Sec. 3, 1, 30--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Schroeder, B. A. 1995. Online monitoring: A tutorial. IEEE Compu., 72--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Sistla, A. P. 1985. On characterization of safety and liveness properties in temporal logic. In Proceedings of the ACM Symposium on Principle of Distributed Computing. ACM, New York, 39--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Sistla, A. P., and Srinivas, A. R. 2008. Monitoring temporal properties of stochastic systems. In Proceedings of International Conference on Verification, Model Checking and Abstract Interpretation. Lecture Notes in Computer Science, vol. 4905. Springer-Verlag, Berlin, Germany, 294--308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Szelepcsenyi, R. 1987. The method of forcing for nondeterministic automata. Bull. EATCS 33, 96--100.Google ScholarGoogle Scholar
  42. Thomas, W. 1990. Automata on infinite objects. In Handbook of Theoretical Computer Science. vol. B. Elsevier, Amsterdam, The Netherlands, 133--192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Time Rover. 1997. http://www.time-rover.com.Google ScholarGoogle Scholar
  44. Vardi, M. 1985. Automatic verification of probabilistic concurrent systems. In Proceedings of the 26th Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press, 327--338. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Viswanathan, M. 2000. Foundations for the runtime analysis of software systems. Ph.D. dissertation. University of Pennsylvania. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On the expressiveness and complexity of randomization in finite state monitors

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in

                    Full Access

                    • Published in

                      cover image Journal of the ACM
                      Journal of the ACM  Volume 56, Issue 5
                      August 2009
                      164 pages
                      ISSN:0004-5411
                      EISSN:1557-735X
                      DOI:10.1145/1552285
                      Issue’s Table of Contents

                      Copyright © 2009 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 21 August 2009
                      • Revised: 1 March 2009
                      • Accepted: 1 March 2009
                      • Received: 1 October 2008
                      Published in jacm Volume 56, Issue 5

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • research-article
                      • Research
                      • Refereed

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader