Cited 0 time in
From Timed Automata to Go: Formally Verified Code Generation and Runtime Monitoring for Cyber-Physical Systems
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Cho, Soomin | - |
| dc.contributor.author | Kang, Inhye | - |
| dc.contributor.author | Kim, Jin Hyun | - |
| dc.date.accessioned | 2025-09-24T01:30:12Z | - |
| dc.date.available | 2025-09-24T01:30:12Z | - |
| dc.date.issued | 2025-09 | - |
| dc.identifier.issn | 2169-3536 | - |
| dc.identifier.issn | 2169-3536 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/80142 | - |
| dc.description.abstract | The design of critical components in cyber-physical systems (CPS) demands rigorous guarantees of safety and correctness, particularly in safety-critical domains such as autonomous vehicles and industrial automation. While formal verification techniques, such as Timed Automata (TA) models analyzed with UPPAAL, provide strong offline assurances, transitioning these models into reliable executable systems remains a major challenge, especially when integrated with unverified legacy systems. This paper shows that combining formal verification with runtime monitoring can effectively bridge this gap and enhance system reliability. We introduce a novel framework that automatically translates UPPAAL-verified TA models into executable Go programs, leveraging a new intermediate formalism, Timed Automata with Disjoint Actions (TADA), to make time progression explicit and resolve semantic ambiguities in code generation. By integrating lightweight runtime monitors into the generated code, our approach ensures continuous enforcement of timing invariants even when verified components interact with legacy elements. Compared to prior work focused solely on offline verification, our hybrid approach offers a robust safety envelope in heterogeneous environments. We demonstrate the effectiveness of our framework through a case study on an industrial control system, showing that it successfully detects and mitigates timing violations introduced by legacy components, significantly improving overall system resilience. | - |
| dc.format.extent | 21 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
| dc.title | From Timed Automata to Go: Formally Verified Code Generation and Runtime Monitoring for Cyber-Physical Systems | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/ACCESS.2025.3608215 | - |
| dc.identifier.scopusid | 2-s2.0-105015459572 | - |
| dc.identifier.wosid | 001579074200013 | - |
| dc.identifier.bibliographicCitation | IEEE Access, v.13, pp 161729 - 161749 | - |
| dc.citation.title | IEEE Access | - |
| dc.citation.volume | 13 | - |
| dc.citation.startPage | 161729 | - |
| dc.citation.endPage | 161749 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordAuthor | automatic code generation | - |
| dc.subject.keywordAuthor | cyber physical systems | - |
| dc.subject.keywordAuthor | formal verification | - |
| dc.subject.keywordAuthor | timed automata | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
