Klaus Havelund | Jet Propulsion Laboratory, California Institute of Technology (original) (raw)

Klaus Havelund

A computer scientist on a space flight.

less

Uploads

Papers by Klaus Havelund

Research paper thumbnail of Survivable Software

Research paper thumbnail of Monitoring First-Order Interval Logic

Lecture Notes in Computer Science, 2021

Research paper thumbnail of Dagstuhl Seminar Proceedings 07011 Runtime Verication

From January 26 2007 the Dagstuhl Seminar 07011`Run07011`Run-time Verication' was held in the... more From January 26 2007 the Dagstuhl Seminar 07011`Run07011`Run-time Verication' was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar have been put together in this paper. The rst section is an executive summary that describes the seminar topics in general. Over the past few years, runtime verication has emerged as a focused subject in program analysis that bridges the gap between the complexity-haunted eld of fully formal verication methods and the ad-hoc eld 1 The website for the seminar:

Research paper thumbnail of A Flight Rule Checker for the LADEE Lunar Spacecraft

As part of the design of a space mission, an important part is the design of so-called flight rul... more As part of the design of a space mission, an important part is the design of so-called flight rules. Flight rules express constraints on various parts and processes of the mission, that if followed, will reduce the risk of failure. One such set of flight rules constrain the format of command sequences regularly (e.g. daily) sent to the spacecraft to control its next near term behavior. We present a high-level view of the automated flight rule checker Frc for checking command sequences sent to NASA’s LADEE Lunar mission spacecraft, used throughout its entire mission. A command sequence is in this case essentially a program (a sequence of commands) with no loops or conditionals, and it can therefore be verified with a trace analysis tool. Frc is implemented using the TraceContract runtime verification tool, an internal Scala DSL for checking event sequences against “formal specifications”. The paper illustrates this untraditional use of runtime verification in a real context, with str...

Research paper thumbnail of Monitorability over Unreliable Channels

In Runtime Verification (RV), monitoring a system means checking an execution trace of a program ... more In Runtime Verification (RV), monitoring a system means checking an execution trace of a program for satisfactions and violations of properties. The question of which properties can be effectively monitored over ideal channels has mostly been answered by prior work. However, program monitoring is often deployed for remote systems where communications may be unreliable. In this work, we address the question of what properties are monitorable over an unreliable communication channel. We describe the different types of mutations that may be introduced to an execution trace and examine their effects on program monitoring. We propose a fixed-parameter tractable algorithm for determining the immunity of a finite automaton to a trace mutation and show how it can be used to classify \(\omega \)-regular properties as monitorable over channels with that mutation.

Research paper thumbnail of Howard Barringer: the Man who Invented the Past

This article is an introduction to Professor Howard Barringer, in honor of his 60th birthday on D... more This article is an introduction to Professor Howard Barringer, in honor of his 60th birthday on December 20, 2011, which was celebrated by the HOWARD-60 workshop (Higher-Order Workshop on Automated Runtime verification and Debugging), held on the same day at University of Manchester.

Research paper thumbnail of What can we monitor over unreliable channels?

International Journal on Software Tools for Technology Transfer, 2021

Research paper thumbnail of Actor-Based Runtime Verification with MESA

Runtime Verification, 2020

Research paper thumbnail of Modeling and Monitoring of Hierarchical State Machines in Scala

Lecture Notes in Computer Science, 2017

Research paper thumbnail of Modeling Rover Communication Using Hierarchical State Machines with Scala

Lecture Notes in Computer Science, 2017

Research paper thumbnail of Inferring event stream abstractions

Formal Methods in System Design, 2018

Research paper thumbnail of Towards a Logic for Inferring Properties of Event Streams

Lecture Notes in Computer Science, 2016

Research paper thumbnail of Experimental Evaluation of Verification and

Research paper thumbnail of Some recent advances in automated analysis

International Journal on Software Tools for Technology Transfer, 2015

Research paper thumbnail of Experience with Rule-Based Analysis of Spacecraft Logs

Communications in Computer and Information Science, 2015

Research paper thumbnail of Grigore Ro su. Monitoring Java programs with Java PathExplorer

Research paper thumbnail of Runtime verification

Research paper thumbnail of Verify Your Runs, Verified Software: Theories, Tools, Experiments: First IFIP TC 2/WG 2.3 Conference, VSTTE 2005, Zurich, Switzerland, October 10-13, 2005, Revised Selected Papers and Discussions

Research paper thumbnail of Runtime verification 2001

Research paper thumbnail of RSL Tutorial

Research paper thumbnail of Survivable Software

Research paper thumbnail of Monitoring First-Order Interval Logic

Lecture Notes in Computer Science, 2021

Research paper thumbnail of Dagstuhl Seminar Proceedings 07011 Runtime Verication

From January 26 2007 the Dagstuhl Seminar 07011`Run07011`Run-time Verication' was held in the... more From January 26 2007 the Dagstuhl Seminar 07011`Run07011`Run-time Verication' was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar have been put together in this paper. The rst section is an executive summary that describes the seminar topics in general. Over the past few years, runtime verication has emerged as a focused subject in program analysis that bridges the gap between the complexity-haunted eld of fully formal verication methods and the ad-hoc eld 1 The website for the seminar:

Research paper thumbnail of A Flight Rule Checker for the LADEE Lunar Spacecraft

As part of the design of a space mission, an important part is the design of so-called flight rul... more As part of the design of a space mission, an important part is the design of so-called flight rules. Flight rules express constraints on various parts and processes of the mission, that if followed, will reduce the risk of failure. One such set of flight rules constrain the format of command sequences regularly (e.g. daily) sent to the spacecraft to control its next near term behavior. We present a high-level view of the automated flight rule checker Frc for checking command sequences sent to NASA’s LADEE Lunar mission spacecraft, used throughout its entire mission. A command sequence is in this case essentially a program (a sequence of commands) with no loops or conditionals, and it can therefore be verified with a trace analysis tool. Frc is implemented using the TraceContract runtime verification tool, an internal Scala DSL for checking event sequences against “formal specifications”. The paper illustrates this untraditional use of runtime verification in a real context, with str...

Research paper thumbnail of Monitorability over Unreliable Channels

In Runtime Verification (RV), monitoring a system means checking an execution trace of a program ... more In Runtime Verification (RV), monitoring a system means checking an execution trace of a program for satisfactions and violations of properties. The question of which properties can be effectively monitored over ideal channels has mostly been answered by prior work. However, program monitoring is often deployed for remote systems where communications may be unreliable. In this work, we address the question of what properties are monitorable over an unreliable communication channel. We describe the different types of mutations that may be introduced to an execution trace and examine their effects on program monitoring. We propose a fixed-parameter tractable algorithm for determining the immunity of a finite automaton to a trace mutation and show how it can be used to classify \(\omega \)-regular properties as monitorable over channels with that mutation.

Research paper thumbnail of Howard Barringer: the Man who Invented the Past

This article is an introduction to Professor Howard Barringer, in honor of his 60th birthday on D... more This article is an introduction to Professor Howard Barringer, in honor of his 60th birthday on December 20, 2011, which was celebrated by the HOWARD-60 workshop (Higher-Order Workshop on Automated Runtime verification and Debugging), held on the same day at University of Manchester.

Research paper thumbnail of What can we monitor over unreliable channels?

International Journal on Software Tools for Technology Transfer, 2021

Research paper thumbnail of Actor-Based Runtime Verification with MESA

Runtime Verification, 2020

Research paper thumbnail of Modeling and Monitoring of Hierarchical State Machines in Scala

Lecture Notes in Computer Science, 2017

Research paper thumbnail of Modeling Rover Communication Using Hierarchical State Machines with Scala

Lecture Notes in Computer Science, 2017

Research paper thumbnail of Inferring event stream abstractions

Formal Methods in System Design, 2018

Research paper thumbnail of Towards a Logic for Inferring Properties of Event Streams

Lecture Notes in Computer Science, 2016

Research paper thumbnail of Experimental Evaluation of Verification and

Research paper thumbnail of Some recent advances in automated analysis

International Journal on Software Tools for Technology Transfer, 2015

Research paper thumbnail of Experience with Rule-Based Analysis of Spacecraft Logs

Communications in Computer and Information Science, 2015

Research paper thumbnail of Grigore Ro su. Monitoring Java programs with Java PathExplorer

Research paper thumbnail of Runtime verification

Research paper thumbnail of Verify Your Runs, Verified Software: Theories, Tools, Experiments: First IFIP TC 2/WG 2.3 Conference, VSTTE 2005, Zurich, Switzerland, October 10-13, 2005, Revised Selected Papers and Discussions

Research paper thumbnail of Runtime verification 2001

Research paper thumbnail of RSL Tutorial

Log In