Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Usa Sammapun is active.

Publication


Featured researches published by Usa Sammapun.


embedded and real-time computing systems and applications | 2005

RT-MaC: runtime monitoring and checking of quantitative and probabilistic properties

Usa Sammapun; Insup Lee; Oleg Sokolsky

Correctness of a real-time system depends on its computation as well as its timeliness and its reliability. In recent years, researches have focused on verifying correctness of a real-time system during runtime by monitoring its execution and checking it against its formal specifications. Such verification method is called runtime verification. Most existing runtime verification tools verify computation correctness using qualitative property specifications but do not verify timeliness or reliability correctness. In this paper, we investigate the verification on timeliness and reliability correctness by offering quantitative and probabilistic property specifications and implementing efficient verifiers.


Electronic Notes in Theoretical Computer Science | 2002

Monitoring, Checking, and Steering of Real-Time Systems

Moonjoo Kim; Insup Lee; Usa Sammapun; Jangwoo Shin; Oleg Sokolsky

The MaC system has been developed to provide assurance that a target program is running correctly with respect to formal requirements specification. This is achieved by monitoring and checking the execution of the target program at run-time. MaC bridges the gap between formal verification, which ensures the correctness of a design rather than an implementation, and testing, which only partially validates an implementation. One weakness of the MaC system is that it can detect property violations but cannot provide any feedback to the running system. To remedy this weakness, the MaC system has been extended with a feedback capability. The resulting system is called MaCS (Monitoring and Checking with Steering). The feedback component uses the information collected during monitoring and checking to steer the application back to a safe state after an error occurs. We present a case study where MaCS is used in a control system that keeps an inverted pendulum upright. MaCS detects faults in controllers and performs dynamic reconfiguration of the control system using steering.


network and system support for games | 2004

Is runtime verification applicable to cheat detection

Margaret DeLap; Björn Knutsson; Honghui Lu; Oleg Sokolsky; Usa Sammapun; Insup Lee; Christos Tsarouchis

We investigate the prospect of applying runtime verification to cheat detection. Game implementation bugs are extensively exploited by cheaters, especially in massively multiplayer games. As games are implemented on larger scales and game object interactions become more complex, it becomes increasingly difficult to guarantee that high-level game rules are enforced correctly in the implementation. We observe that although implementing high-level rules in code is complex because of interference between rules, checking for rule compliance at runtime is simple because only a single rule is involved in each check. We demonstrate our idea by applying the Java-MaC runtime verification system to a simple game to detect a transaction bug that is common in massively multiplayer games.


runtime verification | 2007

Statistical runtime checking of probabilistic properties

Usa Sammapun; Insup Lee; Oleg Sokolsky; John Regehr

Probabilistic correctness is an important aspect of reliable systems. A soft real-time system, for instance, may be designed to tolerate some degree of deadline misses under a threshold. Since probabilistic systems may behave differently from their probabilistic models depending on their current environments, checking the systems at runtime can provide another level of assurance for their probabilistic correctness. This paper presents a statistical runtime verification for probabilistic properties using statistical analysis. However, while this statistical analysis collects a number of execution paths as samples to check probabilistic properties within some certain error bounds, runtime verification can only produce one single sample. This paper provides a technique to produce such a number of samples and applies this methodology to check probabilistic properties in wireless sensor network applications.


Electronic Notes in Theoretical Computer Science | 2006

Run-Time Checking of Dynamic Properties

Oleg Sokolsky; Usa Sammapun; Insup Lee; Jesung Kim

We consider a first-order property specification language for run-time monitoring of dynamic systems. The language is based on a linear-time temporal logic and offers two kinds of quantifiers to bind free variables in a formula. One kind contains the usual first-order quantifiers that provide for replication of properties for dynamically created and destroyed objects in the system. The other kind, called attribute quantifiers, is used to check dynamically changing values within the same object. We show that expressions in this language can be efficiently checked over an execution trace of a system.


Electronic Notes in Theoretical Computer Science | 2005

Simulation of Simultaneous Events in Regular Expressions for Run-Time Verification

Usa Sammapun; Arvind Easwaran; Insup Lee; Oleg Sokolsky

When specifying system requirements, we want a language that can express the requirements in the simplest and most intuitive form. Although the MaC system provides an expressive language, called MEDL, it is generally awkward to express certain features like temporal ordering of complex events, timing constraints, and frequencies of events which are inherent in safety properties. MEDL-RE extends the MEDL language to include regular expressions to easily specify timing dependencies and timing constraints. Due to simultaneous events generated by the MaC system, monitoring regular expressions by simulating DFAs would result in a potential problem. The DFA simulations would involve concurrent multi-path simulations and result in exponential running time. To handle simultaneous events inexpensively, we generate a dependency graph to identify possible simultaneous events. Further, we augment the original DFAs with alternative transitions, which will substitute for multi-path simulations.


Electronic Notes in Theoretical Computer Science | 2003

Formalizing Java-MaC

Usa Sammapun; Raman Sharykin; Margaret DeLap; Myong Kim; Steve Zdancewic

Abstract The Java-MaC framework is a run-time verification system for Java programs that can be used to dynamically test and enforce safety policies. This paper presents a formal model of the Java-MaC safety properties in terms of an operational semantics for Middleweight Java, a realistic subset of full Java. This model is intended to be used as a framework for studying the correctness of Java-MaC program instrumentation, optimizations, and future experimentation with run-time monitor expressiveness. As a preliminary demonstration of this models applicability for these tasks, the paper sketches a correctness result for a simple program instrumentation scheme.


runtime verification | 2007

Runtime Verification for Wireless Sensor Network Applications

Oleg Sokolsky; Usa Sammapun; John Regehr; Insup Lee


Archive | 2005

Checking Correctness At Runtime using Real-Time Java

Usa Sammapun; Insup Lee; Oleg Sokolsky


Archive | 2003

Regular Expressions for Run-Time Verification

Usa Sammapun; Oleg Sokolsky

Collaboration


Dive into the Usa Sammapun's collaboration.

Top Co-Authors

Avatar

Oleg Sokolsky

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Insup Lee

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Margaret DeLap

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Arvind Easwaran

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Björn Knutsson

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jangwoo Shin

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Jesung Kim

University of Pennsylvania

View shared research outputs
Researchain Logo
Decentralizing Knowledge