11
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Detecting Architectural Erosion using Runtime Verification

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The architecture of a system captures important design decisions for the system. Over time, changes in a system's implementation may lead to violations of specific design decisions. This problem is common in industry and known as architectural erosion. Since it may have severe consequences on the quality of a system, research has focused on the development of tools and techniques to address the presented problem. As of today, most of the approaches to detect architectural erosion employ static analysis techniques. While these techniques are well-suited for the analysis of static architectures, they reach their limit when it comes to dynamic architectures. Thus, in this paper, we propose an alternative approach based on runtime verification. To this end, we propose a systematic way to translate a formal specification of architectural constraints to monitors, which can be used to detect violations of these constraints. The approach is implemented in Eclipse/EMF, demonstrated through a running example, and evaluated using two case studies.

          Related collections

          Most cited references23

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          The temporal logic of programs

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A brief account of runtime verification

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Runtime Verification for LTL and TLTL

                Bookmark

                Author and article information

                Journal
                12 September 2019
                Article
                10.4204/EPTCS.304.7
                1909.05973
                01766326-2bf5-485f-a3d6-2d23875879f2

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                EPTCS 304, 2019, pp. 97-114
                In Proceedings ICE 2019, arXiv:1909.05242
                cs.SE cs.DC cs.LO
                EPTCS

                Software engineering,Theoretical computer science,Networking & Internet architecture

                Comments

                Comment on this article