{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:41:04Z","timestamp":1753274464805,"version":"3.40.3"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031742330"},{"type":"electronic","value":"9783031742347"}],"license":[{"start":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T00:00:00Z","timestamp":1728691200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T00:00:00Z","timestamp":1728691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-74234-7_7","type":"book-chapter","created":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T10:01:58Z","timestamp":1728640918000},"page":"109-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["faRM-LTL: A Domain-Specific Architecture for\u00a0Flexible and\u00a0Accelerated Runtime Monitoring of\u00a0LTL Properties"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6471-7438","authenticated-orcid":false,"given":"Amrutha","family":"Benny","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7110-5668","authenticated-orcid":false,"given":"Sandeep","family":"Chandran","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8154-2984","authenticated-orcid":false,"given":"Rajshekar","family":"Kalayappan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3553-4259","authenticated-orcid":false,"given":"Ramchandra","family":"Phawade","sequence":"additional","affiliation":[]},{"given":"Piyush P.","family":"Kurur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,12]]},"reference":[{"key":"7_CR1","unstructured":"An Appendix to faRM-LTL: A Domain-Specific Architecture for Flexible and Accelerated Runtime Monitoring of LTL Properties. https:\/\/unarthal.gitlab.io\/assets\/pdfs\/characterization.pdf"},{"key":"7_CR2","unstructured":"Cicero regex coprocessor. https:\/\/github.com\/DanieleParravicini\/regex_coprocessor"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-02979-0_10","volume-title":"Implementation and Application of Automata","author":"A Almeida","year":"2009","unstructured":"Almeida, A., Almeida, M., Alves, J., Moreira, N., Reis, R.: FAdo and GUItar: tools for automata manipulation and visualization. In: Maneth, S. (ed.) CIAA 2009. LNCS, vol. 5642, pp. 65\u201374. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02979-0_10"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Backasch, R., Hochberger, C., Weiss, A., Leucker, M., Lasslop, R.: Runtime verification for multicore SOC with high-quality trace data. ACM Trans. Des. Autom. Electron. Syst. 18(2) (2013). https:\/\/doi.org\/10.1145\/2442087.2442089","DOI":"10.1145\/2442087.2442089"},{"issue":"4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2000799.2000800","volume":"20","author":"A Bauer","year":"2011","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. (TOSEM) 20(4), 1\u201364 (2011)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Boul\u00e9, M., Zilic, Z.: Automata-based assertion-checker synthesis of PSL properties. ACM Trans. Des. Autom. Electron. Syst. 13(1) (2008). https:\/\/doi.org\/10.1145\/1297666.1297670","DOI":"10.1145\/1297666.1297670"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-030-03769-7_5","volume-title":"Runtime Verification","author":"L Convent","year":"2018","unstructured":"Convent, L., Hungerecker, S., Scheffel, T., Schmitz, M., Thoma, D., Weiss, A.: Hardware-based runtime verification with embedded tracing units and stream processing. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 43\u201363. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_5"},{"key":"7_CR8","unstructured":"Cox, R.: Regular expression matching: the virtual machine approach (2009). http:\/\/swtch.com\/rsc\/regexp\/regexp2.html"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-319-70848-5_12","volume-title":"Formal Methods: Foundations and Applications","author":"N Decker","year":"2017","unstructured":"Decker, N., et al.: Rapidly adjustable non-intrusive online monitoring for multi-core systems. In: Cavalheiro, S., Fiadeiro, J. (eds.) SBMF 2017. LNCS, vol. 10623, pp. 179\u2013196. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70848-5_12"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Delahaye, M., Kosmatov, N., Signoles, J.: Common specification language for static and dynamic analysis of c programs. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 1230\u20131235 (2013)","DOI":"10.1145\/2480362.2480593"},{"key":"7_CR11","unstructured":"Dixit, H.D., Boyle, L., Vunnam, G., Pendharkar, S., Beadon, M., Sankar, S.: Detecting silent data corruptions in the wild. arXiv preprint arXiv:2203.08989 (2022)"},{"key":"7_CR12","unstructured":"Dixit, H.D., et al.: Silent data corruptions at scale. arXiv preprint arXiv:2102.11245 (2021)"},{"issue":"12","key":"7_CR13","doi-asserted-by":"publisher","first-page":"3088","DOI":"10.1109\/TPDS.2014.8","volume":"25","author":"P Dlugosch","year":"2014","unstructured":"Dlugosch, P., Brown, D., Glendenning, P., Leventhal, M., Noyes, H.: An efficient and scalable semiconductor architecture for parallel automata processing. IEEE Trans. Parallel Distrib. Syst. 25(12), 3088\u20133098 (2014). https:\/\/doi.org\/10.1109\/TPDS.2014.8","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/10722468_19","volume-title":"SPIN Model Checking and Software Verification","author":"D Drusinsky","year":"2000","unstructured":"Drusinsky, D.: The temporal rover and the ATG rover. In: Havelund, K., Penix, J., Visser, W. (eds.) SPIN 2000. LNCS, vol. 1885, pp. 323\u2013330. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/10722468_19"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-44585-4_6","volume-title":"Computer Aided Verification","author":"P Gastin","year":"2001","unstructured":"Gastin, P., Oddoux, D.: Fast LTL to B\u00fcchi automata translation. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 53\u201365. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44585-4_6"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-319-11164-3_18","volume-title":"Runtime Verification","author":"J Geist","year":"2014","unstructured":"Geist, J., Rozier, K.Y., Schumann, J.: Runtime observer pairs and Bayesian network reasoners on-board FPGAs: flight-certifiable system health management for embedded systems. In: Bonakdarpour, B., Smolka, S.A. (eds.) RV 2014. LNCS, vol. 8734, pp. 215\u2013230. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11164-3_18"},{"issue":"2","key":"7_CR17","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/S1571-0661(04)00253-1","volume":"55","author":"K Havelund","year":"2001","unstructured":"Havelund, K., Ro\u015fu, G.: Monitoring java programs with java PathExplorer. Electr. Notes Theor. Comput. Sci. 55(2), 200\u2013217 (2001)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"7_CR18","unstructured":"Havelund, K., Rosu, G., Clancy, D.: Java PathExplorer: a runtime verification tool. In: International Space Conference (2001)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Hochschild, P.H., et al.: Cores that don\u2019t count. In: Proceedings of the Workshop on Hot Topics in Operating Systems, pp. 9\u201316 (2021)","DOI":"10.1145\/3458336.3465297"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Huang, Y., Chen, Z., Li, D., Yang, K.: CAMA: energy and memory efficient automata processing in content-addressable memories. In: 2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA), pp. 25\u201337 (2022). https:\/\/doi.org\/10.1109\/HPCA53966.2022.00011","DOI":"10.1109\/HPCA53966.2022.00011"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Jin, D., Meredith, P.O., Lee, C., Ro\u015fu, G.: JavaMOP: efficient parametric runtime monitoring framework. In: 2012 34th International Conference on Software Engineering (ICSE), pp. 1427\u20131430. IEEE (2012)","DOI":"10.1109\/ICSE.2012.6227231"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Jindal, N., et al.: Dhoom: reusing design-for-debug hardware for online monitoring. In: Proceedings of the 56th Annual Design Automation Conference 2019, pp. 1\u20136 (2019)","DOI":"10.1145\/3316781.3317799"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-45337-7_18","volume-title":"ECOOP 2001 \u2014 Object-Oriented Programming","author":"G Kiczales","year":"2001","unstructured":"Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An overview of AspectJ. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol. 2072, pp. 327\u2013354. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45337-7_18"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Kong, L., et al.: Software-hardware codesign for efficient in-memory regular pattern matching. In: Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, pp. 733\u2013748. PLDI 2022, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3519939.3523456","DOI":"10.1145\/3519939.3523456"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-642-40787-1_29","volume-title":"Runtime Verification","author":"N Kosmatov","year":"2013","unstructured":"Kosmatov, N., Signoles, J.: A lesson on runtime assertion checking with Frama-C. In: Legay, A., Bensalem, S. (eds.) RV 2013. LNCS, vol. 8174, pp. 386\u2013399. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40787-1_29"},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/A:1011254632723","volume":"19","author":"O Kupferman","year":"2001","unstructured":"Kupferman, O., Vardi, M.Y.: Model checking of safety properties. Formal Meth. Syst. Des. 19, 291\u2013314 (2001)","journal-title":"Formal Meth. Syst. Des."},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Liu, H., Ibrahim, M., Kayiran, O., Pai, S., Jog, A.: Architectural support for efficient large-scale automata processing. In: 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO), pp. 908\u2013920 (2018). https:\/\/doi.org\/10.1109\/MICRO.2018.00078","DOI":"10.1109\/MICRO.2018.00078"},{"key":"7_CR28","unstructured":"Mijat, R.: Better trace for better software: introducing the new arm coresight system trace macrocell and trace memory controller. ARM, White Paper (2010)"},{"issue":"5s","key":"7_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3476982","volume":"20","author":"D Parravicini","year":"2021","unstructured":"Parravicini, D., Conficconi, D., Sozzo, E.D., Pilato, C., Santambrogio, M.D.: Cicero: a domain-specific architecture for efficient regular expression matching. ACM Trans. Embedd. Comput. Syst. (TECS) 20(5s), 1\u201324 (2021)","journal-title":"ACM Trans. Embedd. Comput. Syst. (TECS)"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-030-22348-9_14","volume-title":"Models, Mindsets, Meta: The What, the How, and the Why Not?","author":"D Peled","year":"2019","unstructured":"Peled, D., Havelund, K.: Refining the safety\u2013liveness classification of temporal properties according to monitorability. In: Margaria, T., Graf, S., Larsen, K.G. (eds.) Models, Mindsets, Meta: The What, the How, and the Why Not? LNCS, vol. 11200, pp. 218\u2013234. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22348-9_14"},{"key":"7_CR31","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s10703-013-0199-z","volume":"44","author":"T Reinbacher","year":"2014","unstructured":"Reinbacher, T., F\u00fcgger, M., Brauer, J.: Runtime verification of embedded real-time systems. Formal Meth. Syst. Des. 44, 203\u2013239 (2014)","journal-title":"Formal Meth. Syst. Des."},{"key":"7_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-54862-8_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"T Reinbacher","year":"2014","unstructured":"Reinbacher, T., Rozier, K.Y., Schumann, J.: Temporal-logic based runtime observer pairs for system health management of real-time systems. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 357\u2013372. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54862-8_24"},{"key":"7_CR33","doi-asserted-by":"publisher","unstructured":"Sadredini, E., Rahimi, R., Lenjani, M., Stan, M., Skadron, K.: Impala: algorithm\/architecture co-design for in-memory multi-stride pattern matching. In: 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA), pp. 86\u201398 (2020). https:\/\/doi.org\/10.1109\/HPCA47549.2020.00017","DOI":"10.1109\/HPCA47549.2020.00017"},{"key":"7_CR34","doi-asserted-by":"publisher","unstructured":"Sadredini, E., Rahimi, R., Verma, V., Stan, M., Skadron, K.: eAP: a scalable and efficient in-memory accelerator for automata processing. In: Proceedings of the 52nd Annual IEEE\/ACM International Symposium on Microarchitecture, pp. 87\u201399. MICRO \u201952, Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3352460.3358324","DOI":"10.1145\/3352460.3358324"},{"key":"7_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-319-23820-3_15","volume-title":"Runtime Verification","author":"J Schumann","year":"2015","unstructured":"Schumann, J., Moosbrugger, P., Rozier, K.Y.: R2U2: monitoring and diagnosis of security threats for unmanned aerial systems. In: Bartocci, E., Majumdar, R. (eds.) RV 2015. LNCS, vol. 9333, pp. 233\u2013249. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23820-3_15"},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Signoles, J., Kosmatov, N., Vorobyov, K.: E-ACSL, a runtime verification tool for safety and security of C programs (tool paper). In: RV-CuBES, pp. 164\u2013173 (2017)","DOI":"10.29007\/fpdh"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Solet, D., B\u00e9chennec, J.L., Briday, M., Faucou, S., Pillement, S.: Hardware runtime verification of embedded software in SoPC. In: 2016 11th IEEE Symposium on Industrial Embedded Systems (SIES), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/SIES.2016.7509425"},{"key":"7_CR38","doi-asserted-by":"publisher","unstructured":"Solet, D., B\u00e9chennec, J.L., Briday, M., Faucou, S., Pillement, S.: Hardware runtime verification of embedded software in SoPC. In: 2016 11th IEEE Symposium on Industrial Embedded Systems (SIES), pp.\u00a01\u20136 (2016). https:\/\/doi.org\/10.1109\/SIES.2016.7509425","DOI":"10.1109\/SIES.2016.7509425"},{"issue":"7","key":"7_CR39","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1016\/j.knosys.2007.05.004","volume":"20","author":"O Spinczyk","year":"2007","unstructured":"Spinczyk, O., Lohmann, D.: The design and implementation of AspectC++. Knowl.-Based Syst. 20(7), 636\u2013651 (2007)","journal-title":"Knowl.-Based Syst."},{"key":"7_CR40","unstructured":"Spinczyk, O., Lohmann, D., Urban, M.: AspectC++: an AOP extension for C++. Softw. Dev. J. 5(68\u201376) (2005)"},{"issue":"6","key":"7_CR41","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1145\/363347.363387","volume":"11","author":"K Thompson","year":"1968","unstructured":"Thompson, K.: Programming techniques: regular expression search algorithm. Commun. ACM 11(6), 419\u2013422 (1968)","journal-title":"Commun. ACM"},{"key":"7_CR42","doi-asserted-by":"crossref","unstructured":"Wang, S., Zhang, G., Wei, J., Wang, Y., Wu, J., Luo, Q.: Understanding silent data corruptions in a large production CPU population. In: Proceedings of the 29th Symposium on Operating Systems Principles, pp. 216\u2013230 (2023)","DOI":"10.1145\/3600006.3613149"},{"key":"7_CR43","doi-asserted-by":"publisher","unstructured":"Wen, Z., Kong, L., Le\u00a0Glaunec, A., Mamouras, K., Yang, K.: BVAP: energy and memory efficient automata processing for regular expressions with bounded repetitions. In: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2, pp. 151\u2013166. ASPLOS 2024, Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3620665.3640412","DOI":"10.1145\/3620665.3640412"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Zhou, W., Hu, F., Ma, J.: Improving flexibility in embedded system runtime verification with python. In: 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 281\u2013282. IEEE (2022)","DOI":"10.1109\/ISSREW55968.2022.00080"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-74234-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T10:02:44Z","timestamp":1728640964000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-74234-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,12]]},"ISBN":["9783031742330","9783031742347"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-74234-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,12]]},"assertion":[{"value":"12 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Runtime Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Instanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/yeni.cmpe.bogazici.edu.tr\/rv24\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}