J. Aizpurua, E. Muxika, Y. Papadopoulos, F. Chiacchio, and G. Manno, Application of the d3h2 methodology for the cost-effective design of dependable systems, Safety, vol.2, issue.2, 2016.

R. Alur, D. Fisman, and M. Raghothaman, Regular programming for quantitative properties of data streams, pp.15-40, 2016.

A. Alvaro, E. S. De-almeida, and S. R. De-lemos-meira, Software component certification: a survey, 31st EUROMICRO Conference on Software Engineering and Advanced Applications, pp.106-113, 2005.

M. Araya, O. Buffet, V. Thomas, and F. Charpillet, A pomdp extension with beliefdependent rewards, Advances in Neural Information Processing Systems, vol.23, pp.64-72, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00535560

S. Arnautov, B. Trach, F. Gregor, T. Knauth, A. Martin et al., SCONE: Secure linux containers with intel SGX, 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pp.689-703, 2016.

A. Avizienis, J. C. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Trans. Dependable Secur. Comput, vol.1, issue.1, pp.11-33, 2004.

A. Avizienis, J. C. Laprie, and B. Randell, Fundamental concepts of dependability, Computing Science, 2001.

A. Bauer, M. Leucker, and C. Schallhart, Monitoring of real-time properties, FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science, pp.260-272, 2006.

P. Bishop and R. Bloomfield, A methodology for safety case development, 1998.

C. G. Cassandras and S. Lafortune, Introduction to Discrete Event Systems, 2010.

S. Ceri, G. Gottlob, and L. Tanca, What you always wanted to know about datalog (and never dared to ask), IEEE Trans. Knowl. Data Eng, vol.1, issue.1, pp.146-166, 1989.

N. R. Council, Software for Dependable Systems: Sufficient Evidence? The National Academies Press, 2007.

P. A. Currit, M. Dyer, and H. D. Mills, Certifying the reliability of software, IEEE Transactions on Software Engineering SE, vol.12, issue.1, pp.3-11, 1986.

B. D'angelo, S. Sankaranarayanan, C. Sanchez, W. Robinson, B. Finkbeiner et al., Lola: runtime monitoring of synchronous systems, 12th International Symposium on Temporal Representation and Reasoning (TIME'05), pp.166-174, 2005.

M. Felser, R. Kapitza, J. Kleinöder, W. Schröder-preikschat, A. Rettberg et al., Dynamic software update of resource-constrained distributed embedded systems, Embedded System Design: Topics, Techniques and Trends, pp.387-400, 2007.

A. Fiori and C. Weidenbach, SCL with theory constraints, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02975868

M. Fleury, Formalization of logical calculi in Isabelle/HOL, 2020.
URL : https://hal.archives-ouvertes.fr/tel-02963301

M. Ghallab, D. Nau, and P. Traverso, Automated Planning and Acting, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01959084

S. Giro, P. R. D'argenio, ]. Fioriti, and L. M. , Distributed probabilistic input/output automata: Expressiveness, (un)decidability and algorithms, Theoretical Computer Science, vol.538, pp.84-102, 2014.

, S0304397513005203, quantitative Aspects of Programming Languages and Systems, pp.2011-2023

H. Heck, S. Rudolph, C. Gruhl, A. Wacker, J. Hähner et al., Towards autonomous self-tests at runtime, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), pp.98-99, 2016.

W. Heimerdinger and C. Weinstock, A conceptual framework for system fault tolerance, 1992.

M. Horbach, M. Voigt, and C. Weidenbach, On the combination of the bernaysschönfinkel-ramsey fragment with simple linear integer arithmetic, Automated Deduction -CADE 26 -26th International Conference on Automated Deduction, vol.10395, pp.77-94, 2017.

M. Horbach, M. Voigt, and C. Weidenbach, The universal fragment of presburger arithmetic with unary uninterpreted predicates is undecidable, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01592177

A. M. Kessler, Elon musk says self-driving tesla cars will be in the us by summer, The New York Times, vol.19, 2015.

D. Kuvaiskii, R. Faqeh, P. Bhatotia, P. Felber, and C. Fetzer, Haft: Hardwareassisted fault tolerance, Proceedings of the Eleventh European Conference on Computer Systems. EuroSys '16, 2016.

D. Kuvaiskii and C. Fetzer, ?-encoding : Practical encoded processing, 2015.

D. Kuvaiskii, O. Oleksenko, S. Arnautov, B. Trach, P. Bhatotia et al., Sgxbounds: Memory safety for shielded execution, Proceedings of the Twelfth European Conference on Computer Systems. p. 205-221. EuroSys '17, 2017.

D. Kuvaiskii, O. Oleksenko, P. Bhatotia, P. Felber, and C. Fetzer, Elzar: Triple modular redundancy using intel avx (practical experience report), 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016.

P. Lammich, Efficient verified (UN)SAT certificate checking, Journal of Automated Reasoning, vol.64, issue.3, pp.513-532, 2020.

J. C. Laprie, Dependability: Basic concepts and terminology, Dependability: Basic Concepts and Terminology, pp.3-245, 1992.

M. Leucker, C. Sánchez, T. Scheffel, M. Schmitz, and A. Schramm, Tessla: Runtime verification of non-synchronized real-time streams, ACM Symposium on Applied Computing (SAC), 2018.

M. Leucker and C. Schallhart, A brief account of runtime verification, the 1st Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS'07), vol.78, pp.293-303, 2009.

N. A. Lynch, Input/output automata: Basic, timed, hybrid, probabilistic, dynamic, vol.2761, pp.187-188, 2003.

A. K. Lyyra and K. M. Koskinen, With software updates, tesla upends product life cycle in the car industry, LSE Business Review, 2017.

E. F. Moore, Gedanken-experiments on sequential machines, Automata studies, vol.34, pp.129-153, 1956.

R. Nieuwenhuis, A. Oliveras, and C. Tinelli, Solving sat and sat modulo theories: From an abstract davis-putnam-logemann-loveland procedure to dpll(t), Journal of the ACM, vol.53, pp.937-977, 2006.

R. Palin, D. Ward, I. Habli, and R. Rivett, Iso 26262 safety cases: Compliance and assurance, vol.2011, 2011.

P. Ramadge and W. Wonham, Supervisory Control of a Class of Discrete Event Processes, vol.25, pp.206-230, 1987.

S. Russell and P. Norvig, Artificial Intelligence: A Modern Approach, 2010.

F. Salfner and M. Malek, Architecting Dependable Systems with Proactive Fault Management, pp.171-200, 2010.

J. H. Saltzer, D. P. Reed, and D. D. Clark, End-to-end arguments in system design, ACM Trans. Comput. Syst, vol.2, issue.4, pp.277-288, 1984.

,

F. B. Schneider, Implementing fault-tolerant services using the state machine approach: A tutorial, ACM Computing Surveys (CSUR), vol.22, issue.4, pp.299-319, 1990.

M. Voigt, The bernays-schönfinkel-ramsey fragment with bounded difference constraints over the reals is decidable, vol.10483, pp.244-261, 2017.

W. Wu and T. Kelly, Safety tactics for software architecture design, Proceedings of the 28th Annual International Computer Software and Applications Conference, vol.1, pp.368-375, 2004.

K. Åström, Optimal control of markov processes with incomplete state information, Journal of Mathematical Analysis and Applications, vol.10, issue.1, pp.174-205, 1965.