Combining Monitoring with Run-Time Assertion Checking

Frank S. de Boer, Stijn de Gouw

Research output: Chapter in Book/Report/Conference proceedingConference Article in proceedingAcademicpeer-review

Abstract

According to a study in 2002 commisioned by a US Department, software bugs annually costs the US economy an estimated $59 billion. A more recent study in 2013 by Cambridge University estimated that the global cost has risen to $312 billion globally.

There exists various ways to prevent, isolate and fix software bugs, ranging from lightweight methods that are (semi)-automatic, to heavyweight methods that require significant user interaction. Our own method described in this tutorial is based on automated run-time checking of a combination of protocol- and data-oriented properties of object-oriented programs.
Original languageEnglish
Title of host publicationFormal Methods for Executable Software Models
Subtitle of host publication14th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2014, Bertinoro, Italy, June 16-20, 2014, Advanced Lectures
EditorsMarco Bernardo , Ferruccio Damiani , Reiner Hähnle , Einar Broch Johnsen , Ina Schaefer
PublisherSpringer
Pages217-262
Number of pages46
ISBN (Electronic)978-3-319-07317-0
ISBN (Print)978-3-319-07316-3
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event14th International School on Formal Methods for the Design of Computer, Communication and Software Systems: Executable Software Models - Bertinoro, Italy
Duration: 16 Jun 201420 Jun 2014
http://www.sti.uniurb.it/events/sfm14esm/

Publication series

SeriesLecture Notes in Computer Science
Volume8483
ISSN0302-9743

Seminar

Seminar14th International School on Formal Methods for the Design of Computer, Communication and Software Systems
Abbreviated titleSFM-14: ESM
Country/TerritoryItaly
CityBertinoro
Period16/06/1420/06/14
Internet address

Fingerprint

Dive into the research topics of 'Combining Monitoring with Run-Time Assertion Checking'. Together they form a unique fingerprint.

Cite this