Runtime Verification Method for Social Network Security Based on Source Code Instrumentation

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security of social network is a serious issue that cannot be ignored. In order to improve the situation that most traditional verification methods are not real-time and too complicated, this paper proposes a runtime verification method based on source code instrumentation for social network systems. First, a property related to a social network system’s characteristics is formalized as a three-valued propositional projection temporal logic (PPTL 3 ) formula, and based on the formula a monitor is constructed. Then, probes are instrumented into the source code of the system, which capture events and generate the execution trace of the system. The trace is dealt with by the monitor in real-time to check whether the system satisfies or violates the desired property. To illustrate the effectiveness of this method, a case study of an open-source social network system is provided.

Cite

CITATION STYLE

APA

Wang, X., Guo, W., Zhao, L., & Shu, X. (2019). Runtime Verification Method for Social Network Security Based on Source Code Instrumentation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11392 LNCS, pp. 55–70). Springer Verlag. https://doi.org/10.1007/978-3-030-13651-2_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free