RV 2015

  • 2015-09-22

15th International Conference on Runtime Verification

Runtime verification is concerned with monitoring and analysis of software and hardware system executions. Runtime verification techniques are crucial for system correctness, reliability, and robustness; they are significantly more powerful and versatile than conventional testing, and more practical than exhaustive formal verification. Runtime verification can be used prior to deployment, for testing, verification, and debugging purposes, and after deployment for ensuring reliability, safety, and security and for providing fault containment and recovery as well as online system repair.

The RV series of events started in 2001, as an annual workshop. The RV’01 to RV’05 proceedings were published in ENTCS. Since 2006, the RV proceedings have been published in LNCS. Starting with year 2010, RV is an international conference. Links to past RV events can be found at the permanent URL www.runtime-verification.org.

Invited Talks

Patrice Godefroid (Microsoft Research, USA): 20 Years of Dynamic Software Model Checking

Sriram Sankaranarayanan (University of Colorado Boulder, USA): Simulation-Based Falsification of Cyber-Physical Systems

Georg Weissenbacher (Vienna University of Technology, Austria): Heisenbugs – When Programs Fail

Topics of interest to the conference include:

  • specification languages
  • specification mining
  • program instrumentation
  • monitor construction techniques
  • logging, recording, and replay
  • fault detection, localization, containment, recovery and repair
  • program steering and adaptation
  • metrics and statistical information gathering
  • combination of static and dynamic analyses
  • program execution visualization
  • monitoring techniques for safety/mission-critical systems
  • monitoring distributed systems, cloud services, and big data applications
  • monitoring security and privacy policies

Application areas of runtime verification include safety/mission-critical systems, enterprise and systems software, autonomous and reactive control systems, health management and diagnosis systems, and system security and privacy.


Note: This is one of the thousands of items we imported from the old website. We’re in the process of reviewing each and every one, but if you notice something strange about this particular one, please let us know. — Thanks!