Verify your runs Verified Software: Theories, Tools, Experiments: First IFIP TC 2/WG 2.3 Conference, VSTTE 2005. Revised Selected Papers and Discussions, pp.374-383, 2008. ,
A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2008. ,
DOI : 10.1016/j.jlap.2008.08.004
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, 2000. ,
DOI : 10.1109/fits.2003.1264930
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853
Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, 2009. ,
DOI : 10.1145/1455526.1455532
Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006. ,
DOI : 10.1145/1111596.1111601
Enforcement monitoring wrt. the safetyprogress classification of properties, SAC '09: Proceedings of the ACM symposium on Applied Computing, pp.593-600, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00953590
Security Monitor Inlining for Multithreaded Java, Genoa: Proceedings of the 23 rd European Conference on ECOOP ? Object-Oriented Programming, pp.546-569, 2009. ,
DOI : 10.1023/A:1025055424017
Provably correct runtime monitoring, FM '08: Proceedings of the 15 th int, pp.262-277, 2008. ,
DOI : 10.1016/j.jlap.2008.12.002
URL : http://doi.org/10.1016/j.jlap.2008.12.002
SASI enforcement of security policies, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, pp.87-95, 2000. ,
DOI : 10.1145/335169.335201
Rewrite Based Specification of Access Control Policies, Electronic Notes in Theoretical Computer Science, vol.234, pp.37-54, 2009. ,
DOI : 10.1016/j.entcs.2009.02.071
URL : https://hal.archives-ouvertes.fr/inria-00335091
Weaving rewrite-based access control policies, Proceedings of the 2007 ACM workshop on Formal methods in security engineering , FMSE '07, pp.71-80, 2007. ,
DOI : 10.1145/1314436.1314446
URL : https://hal.archives-ouvertes.fr/inria-00185710
An Overview of the Runtime Verification Tool Java PathExplorer, Formal Methods in System Design, vol.24, issue.2, 2003. ,
DOI : 10.1023/B:FORM.0000017721.39909.4b
Runtime Verification of C Programs, pp.7-22, 2008. ,
DOI : 10.1007/11550679_13
The Temporal Rover and the ATG Rover, pp.323-330, 2000. ,
DOI : 10.1007/10722468_19
MOP: An Efficient and Generic Runtime Verification Framework, OOPSLA'07: Object-Oriented Programming, pp.569-588, 2007. ,
Parametric Trace Slicing and Monitoring, TACAS'09: 15 th International Conference Tools and Algorithms for the Construction and Analysis of Systems, pp.246-261, 2009. ,
DOI : 10.1023/A:1011227529550
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.471.347
Temporal and Modal Logic, pp.995-1072, 1990. ,
DOI : 10.1016/B978-0-444-88074-1.50021-4
Proving the Correctness of Multiprocess Programs, IEEE Transactions on Software Engineering, vol.3, issue.2, pp.125-143, 1977. ,
DOI : 10.1109/TSE.1977.229904
Defining liveness, Information Processing Letters, vol.21, issue.4, pp.181-185, 1985. ,
DOI : 10.1016/0020-0190(85)90056-0
Adequate proof principles for invariance and liveness properties of concurrent programs, Science of Computer Programming, vol.4, issue.3, pp.257-289, 1984. ,
DOI : 10.1016/0167-6423(84)90003-0
Proving Liveness Properties of Concurrent Programs, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.455-495, 1982. ,
DOI : 10.1145/357172.357178
On characterization of safety and liveness properties in temporal logic, Proceedings of the fourth annual ACM symposium on Principles of distributed computing , PODC '85, pp.39-48, 1985. ,
DOI : 10.1145/323596.323600
A hierarchy of temporal properties, Proceedings of the sixth annual ACM Symposium on Principles of distributed computing , PODC '87, 1989. ,
DOI : 10.1145/41840.41857
Characterization of temporal property classes, In: Automata, Languages and Programming, pp.474-486, 1992. ,
DOI : 10.1007/3-540-55719-9_97
The Safety-Progress Classification, 1992. ,
DOI : 10.1007/978-3-642-58041-3_5
Propositional Dynamic Logic of looping and converse, Proceedings of the thirteenth annual ACM symposium on Theory of computing , STOC '81, pp.375-383, 1981. ,
DOI : 10.1145/800076.802492
What can you verify and enforce at runtime ? Software Tools for Technology Transfer, special issue on Runtime Verification (2010) Invited Paper, under review ,
Run-time verification In: Model-based Testing of Reactive Systems, LNCS, vol.3472, pp.525-556, 2005. ,
jPredictor, Proceedings of the 13th international conference on Software engineering , ICSE '08, pp.221-230, 2008. ,
DOI : 10.1145/1368088.1368119
Racer, Proceedings of the 2008 international symposium on Software testing and analysis, ISSTA '08, 2009. ,
DOI : 10.1145/1390630.1390650
Dynamic Deadlock Analysis of Multi-threaded Programs, Hardware and Software Verification and Testing, 1 st International Haifa Verification Conference. Revised Selected Papers, pp.208-223, 2005. ,
DOI : 10.1007/11678779_15
Atomizer: a dynamic atomicity checker for multithreaded programs, POPL '04: Proceedings of the 31 st ACM SIGPLAN- SIGACT symposium on Principles of programming languages, pp.256-267, 2004. ,
Do you really mean what you actually enforced? In: FAST'08: 5 th International Workshop on Formal Aspects in Security and Trust. Revised Selected Papers, pp.287-301, 2008. ,
Aspect-oriented programming, pp.220-242, 1997. ,
A taxonomy and catalog of runtime software-fault monitoring tools, IEEE Transactions on Software Engineering, vol.30, issue.12, pp.859-872, 2004. ,
DOI : 10.1109/TSE.2004.91
Foundations for the Run-Time Monitoring of Reactive Systems ??? Fundamentals of the MaC Language, Colloquium on Theoretical Aspects of Computing. Revised Selected Papers, pp.543-556, 2004. ,
DOI : 10.1007/978-3-540-31862-0_38
PSL Model Checking and Run-Time Verification Via Testers, FM'06: Proceedings of Formal Methods, pp.573-586, 2006. ,
DOI : 10.1007/11813040_38
Comparing LTL Semantics for Runtime Verification, Journal of Logic and Computation, vol.20, issue.3, 2009. ,
DOI : 10.1093/logcom/exn075
URL : http://logcom.oxfordjournals.org/cgi/content/short/20/3/651
Runtime Verification of Safety-Progress Properties, RV'09: Proceedings of the 9 th Workshop on Runtime Verification. Revised selected Papers, pp.40-59, 2009. ,
DOI : 10.1137/0201010
URL : https://hal.archives-ouvertes.fr/hal-00420487
Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, vol.20, issue.4, 2007. ,
DOI : 10.1145/2000799.2000800
Efficient monitoring of ?-languages, Proceedings of 17 th Int. Conference on Computer-aided Verification (CAV'05, pp.364-378, 2005. ,
Rule Systems for Run-time Monitoring: from EAGLE to RULER, RV'07: 7 th International Workshop on Runtime Verification. Revised Selected Papers, pp.111-125, 2007. ,
DOI : 10.1093/logcom/exn076
Policy Enforcement via Program Monitoring, 2006. ,
Runtime enforcement monitors: composition, synthesis, and enforcement abilities (2010) under revision at Formal Methods in System Design ,
Enforcing Non-safety Security Policies with Program Monitors, ESORICS'05 Proceedings of the 10 th European Symposium on Research in Computer Security, pp.355-373, 2005. ,
DOI : 10.1007/11555827_21
Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005. ,
DOI : 10.1007/s10207-004-0046-8
Access control by tracking shallow execution history, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.43-55, 2004. ,
DOI : 10.1109/SECPRI.2004.1301314
Execution monitoring enforcement for limitedmemory systems, PST'06: Proceedings of the International Conference on Privacy, pp.1-12, 2006. ,
Foundations for the run-time analysis of software systems, 2000. ,
Security Policies Enforcement Using Finite Edit Automata, Electronic Notes in Theoretical Computer Science, vol.229, issue.3, pp.19-35, 2009. ,
DOI : 10.1016/j.entcs.2009.06.037
Infinite Words, Automata, Semigroups, Logic and Games, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-00112831
Through Modeling to Synthesis of Security Automata, Electronic Notes in Theoretical Computer Science, vol.179, pp.31-46, 2007. ,
DOI : 10.1016/j.entcs.2006.08.029
Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting, Electronic Notes in Theoretical Computer Science, vol.186, pp.101-120, 2007. ,
DOI : 10.1016/j.entcs.2007.03.025
Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties, ICISS'08: Proceedings of the 4 th International Conference on Information Systems Security, pp.41-55, 2008. ,
DOI : 10.1145/298595.298598
URL : https://hal.archives-ouvertes.fr/hal-00346063
Generating In-Line Monitors for Rabin Automata, NordSec'09: 14 th Nordic Conf. on Secure IT Systems, pp.287-301, 2009. ,
DOI : 10.1137/0201010