SlideShare une entreprise Scribd logo
1  sur  18
Runtime Monitoring of
Component Changes with
     Spy@Runtime
         Carlo Ghezzi
         Andrea Mocci
        Mario Sangiorgio
OPEN ENVIRONMENT



Application   Service




                        2
ISSUES



Lack of formal       Services may change
specifications              behavior




                                           3
GOALS



 Recover specifications
                         Detect changes
and keep them updated




                                          4
GOALS



 Recover specifications
                         Detect changes
and keep them updated


                 AT RUNTIME

                                          4
SPY@RUNTIME
DESIGN TIME           RUN TIME
                             Specification
                               Update
 Specification   Monitoring
                               Change
                              Detection
  Inference



                                            5
MODELS NEEDED
   Protocol Behavior Model          Behavior Equivalence Model

Only the protocol of interaction    Precise behavior description

        General validity               Valid in a small scope

      Built via abstraction        Built from an exhaustive search

        Monitoring                 Violation Interpretation

                                                                     6
MODELS NEEDED
   Protocol Behavior Model          Behavior Equivalence Model

Only the protocol of interaction    Precise behavior description

        General validity               Valid in a small scope

      Built via abstraction        Built from an exhaustive search

        Monitoring                 Violation Interpretation

                                                                     6
MODELS NEEDED
   Protocol Behavior Model          Behavior Equivalence Model

Only the protocol of interaction    Precise behavior description

        General validity               Valid in a small scope

      Built via abstraction        Built from an exhaustive search

        Monitoring                 Violation Interpretation

                                                                     6
MODELS NEEDED
   Protocol Behavior Model          Behavior Equivalence Model

Only the protocol of interaction    Precise behavior description

        General validity               Valid in a small scope

      Built via abstraction        Built from an exhaustive search

        Monitoring                 Violation Interpretation

                                                                     6
MODELS NEEDED
   Protocol Behavior Model          Behavior Equivalence Model

Only the protocol of interaction    Precise behavior description

        General validity               Valid in a small scope

      Built via abstraction        Built from an exhaustive search

        Monitoring                 Violation Interpretation

                                                                     6
DESIGN TIME

 Scope               API         Dynamic
selection      instrumentation   analysis




                                            7
DESIGN TIME

 Scope                  API           Dynamic
selection         instrumentation     analysis




            Service behavior models
                                                 7
DESIGN TIME

 Scope                  API           Dynamic
selection         instrumentation     analysis




            Service behavior models
                                                 7
RUN TIME



Application    Monitor   Service




                                   8
VIOLATION DETECTION



Execution      Protocol
  Trace     Behavior Model




                             9
VIOLATION INTERPRETATION

    Protocol
 Behavior Model
                   Behavioral
                  Equivalence
                    Model




                                10
LIVE DEMO



Update of an incomplete model

 Detection of an injected fault



                                  11

Contenu connexe

Dernier

Dernier (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

En vedette

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Runtime Monitoring of Component Changes with Spy@Runtime

  • 1. Runtime Monitoring of Component Changes with Spy@Runtime Carlo Ghezzi Andrea Mocci Mario Sangiorgio
  • 3. ISSUES Lack of formal Services may change specifications behavior 3
  • 4. GOALS Recover specifications Detect changes and keep them updated 4
  • 5. GOALS Recover specifications Detect changes and keep them updated AT RUNTIME 4
  • 6. SPY@RUNTIME DESIGN TIME RUN TIME Specification Update Specification Monitoring Change Detection Inference 5
  • 7. MODELS NEEDED Protocol Behavior Model Behavior Equivalence Model Only the protocol of interaction Precise behavior description General validity Valid in a small scope Built via abstraction Built from an exhaustive search Monitoring Violation Interpretation 6
  • 8. MODELS NEEDED Protocol Behavior Model Behavior Equivalence Model Only the protocol of interaction Precise behavior description General validity Valid in a small scope Built via abstraction Built from an exhaustive search Monitoring Violation Interpretation 6
  • 9. MODELS NEEDED Protocol Behavior Model Behavior Equivalence Model Only the protocol of interaction Precise behavior description General validity Valid in a small scope Built via abstraction Built from an exhaustive search Monitoring Violation Interpretation 6
  • 10. MODELS NEEDED Protocol Behavior Model Behavior Equivalence Model Only the protocol of interaction Precise behavior description General validity Valid in a small scope Built via abstraction Built from an exhaustive search Monitoring Violation Interpretation 6
  • 11. MODELS NEEDED Protocol Behavior Model Behavior Equivalence Model Only the protocol of interaction Precise behavior description General validity Valid in a small scope Built via abstraction Built from an exhaustive search Monitoring Violation Interpretation 6
  • 12. DESIGN TIME Scope API Dynamic selection instrumentation analysis 7
  • 13. DESIGN TIME Scope API Dynamic selection instrumentation analysis Service behavior models 7
  • 14. DESIGN TIME Scope API Dynamic selection instrumentation analysis Service behavior models 7
  • 15. RUN TIME Application Monitor Service 8
  • 16. VIOLATION DETECTION Execution Protocol Trace Behavior Model 9
  • 17. VIOLATION INTERPRETATION Protocol Behavior Model Behavioral Equivalence Model 10
  • 18. LIVE DEMO Update of an incomplete model Detection of an injected fault 11

Notes de l'éditeur

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. Soprattutto di’ che la scope selection ha un costo inferiore o al massimo analogo alla scrittura di casi di test.\n
  12. Soprattutto di’ che la scope selection ha un costo inferiore o al massimo analogo alla scrittura di casi di test.\n
  13. \n
  14. \n
  15. Stress that BEM is used as an oracle to determine whether everything is still behaving correctly.\nExplain clearly how we use it to determine the nature of a violation\n
  16. \n