Detecting Architectural Erosion using Runtime Verification
The architecture of a system captures important design decisions for the system. Over time, changes in a system's implementation may lead to violations of specific design decisions. This problem is common in industry and known as architectural erosion. Since it may have severe consequences on t...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Open Publishing Association
2019-09-01
|
Series: | Electronic Proceedings in Theoretical Computer Science |
Online Access: | http://arxiv.org/pdf/1909.05973v1 |
id |
doaj-67f915763d284d88a4a33f6f2aea4c1f |
---|---|
record_format |
Article |
spelling |
doaj-67f915763d284d88a4a33f6f2aea4c1f2020-11-25T02:12:44ZengOpen Publishing AssociationElectronic Proceedings in Theoretical Computer Science2075-21802019-09-01304Proc. ICE 20199711410.4204/EPTCS.304.7:5Detecting Architectural Erosion using Runtime VerificationDiego Marmsoler0Ana Petrovska1 Technische Universität München Technische Universität München The architecture of a system captures important design decisions for the system. Over time, changes in a system's implementation may lead to violations of specific design decisions. This problem is common in industry and known as architectural erosion. Since it may have severe consequences on the quality of a system, research has focused on the development of tools and techniques to address the presented problem. As of today, most of the approaches to detect architectural erosion employ static analysis techniques. While these techniques are well-suited for the analysis of static architectures, they reach their limit when it comes to dynamic architectures. Thus, in this paper, we propose an alternative approach based on runtime verification. To this end, we propose a systematic way to translate a formal specification of architectural constraints to monitors, which can be used to detect violations of these constraints. The approach is implemented in Eclipse/EMF, demonstrated through a running example, and evaluated using two case studies.http://arxiv.org/pdf/1909.05973v1 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Diego Marmsoler Ana Petrovska |
spellingShingle |
Diego Marmsoler Ana Petrovska Detecting Architectural Erosion using Runtime Verification Electronic Proceedings in Theoretical Computer Science |
author_facet |
Diego Marmsoler Ana Petrovska |
author_sort |
Diego Marmsoler |
title |
Detecting Architectural Erosion using Runtime Verification |
title_short |
Detecting Architectural Erosion using Runtime Verification |
title_full |
Detecting Architectural Erosion using Runtime Verification |
title_fullStr |
Detecting Architectural Erosion using Runtime Verification |
title_full_unstemmed |
Detecting Architectural Erosion using Runtime Verification |
title_sort |
detecting architectural erosion using runtime verification |
publisher |
Open Publishing Association |
series |
Electronic Proceedings in Theoretical Computer Science |
issn |
2075-2180 |
publishDate |
2019-09-01 |
description |
The architecture of a system captures important design decisions for the system. Over time, changes in a system's implementation may lead to violations of specific design decisions. This problem is common in industry and known as architectural erosion. Since it may have severe consequences on the quality of a system, research has focused on the development of tools and techniques to address the presented problem. As of today, most of the approaches to detect architectural erosion employ static analysis techniques. While these techniques are well-suited for the analysis of static architectures, they reach their limit when it comes to dynamic architectures. Thus, in this paper, we propose an alternative approach based on runtime verification. To this end, we propose a systematic way to translate a formal specification of architectural constraints to monitors, which can be used to detect violations of these constraints. The approach is implemented in Eclipse/EMF, demonstrated through a running example, and evaluated using two case studies. |
url |
http://arxiv.org/pdf/1909.05973v1 |
work_keys_str_mv |
AT diegomarmsoler detectingarchitecturalerosionusingruntimeverification AT anapetrovska detectingarchitecturalerosionusingruntimeverification |
_version_ |
1724908530993987584 |