{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:57:06Z","timestamp":1777658226504,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":141,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Google Cyber NYC Institutional Research","award":[""],"award-info":[{"award-number":[""]}]},{"name":"Intel Rising Star Faculty Award","award":[""],"award-info":[{"award-number":[""]}]},{"name":"NSF (National Science Foundation)","award":["CCF-2045596, CCF-2319473"],"award-info":[{"award-number":["CCF-2045596, CCF-2319473"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3650212.3680400","type":"proceedings-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:44:25Z","timestamp":1726055065000},"page":"1798-1810","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["An In-Depth Study of Runtime Verification Overheads during Software Testing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4553-7474","authenticated-orcid":false,"given":"Kevin","family":"Guan","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5631-4816","authenticated-orcid":false,"given":"Owolabi","family":"Legunsen","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290365"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Luca Aceto Antonis Achilleos Adrian Francalanza Anna Ing\u00f3lfsd\u00f3ttir and Karoliina Lehtinen. 2019. An operational guide to monitorability. In SEFM.","DOI":"10.1007\/978-3-030-30446-1_23"},{"key":"e_1_3_2_1_3_1","volume-title":"Laurie Hendren, Sascha Kuzins, Ond\u0159ej Lhot\u00e1k, Oege de Moor, Damien Sereni, Ganesh Sittampalam, and Julian Tibble.","author":"Allan Chris","year":"2005","unstructured":"Chris Allan, Pavel Avgustinov, Aske Simon Christensen, Laurie Hendren, Sascha Kuzins, Ond\u0159ej Lhot\u00e1k, Oege de Moor, Damien Sereni, Ganesh Sittampalam, and Julian Tibble. 2005. Adding Trace Matching with Free Variables to AspectJ. In OOPSLA."},{"key":"e_1_3_2_1_4_1","unstructured":"2024. Apache Maven. http:\/\/maven.apache.org\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449776"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.11.007"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Cyrille Artho Doron Drusinksy Allen Goldberg Klaus Havelund Mike Lowry Corina Pasareanu Grigore Ro\u015fu and Willem Visser. 2003. Experiments with test case generation and runtime analysis. In Abstract State Machines.","DOI":"10.1007\/3-540-36498-6_5"},{"key":"e_1_3_2_1_8_1","unstructured":"2005. Chapter 5. Load-Time Weaving. https:\/\/eclipse.dev\/aspectj\/doc\/released\/devguide\/ltw.html"},{"key":"e_1_3_2_1_9_1","unstructured":"2024. Sampling CPU and HEAP profiler for Java. https:\/\/github.com\/async-profiler\/async-profiler"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Pavel Avgustinov Julian Tibble and Oege de Moor. 2007. Making trace monitors feasible. In OOPSLA.","DOI":"10.1145\/1297105.1297070"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Howard Barringer Allen Goldberg Klaus Havelund and Koushik Sen. 2004. Rule-Based Runtime Verification. In VMCAI.","DOI":"10.1007\/978-3-540-24622-0_5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exn076"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Ezio Bartocci Borzoo Bonakdarpour and Yli\u00e8s Falcone. 2014. First International Competition on Software for Runtime Verification. In RV.","DOI":"10.1007\/978-3-319-11164-3_1"},{"key":"e_1_3_2_1_14_1","volume-title":"First international Competition on Runtime Verification: Rules, benchmarks, tools, and final results. IJSTTT, 21, 1","author":"Bartocci Ezio","year":"2019","unstructured":"Ezio Bartocci, Yli\u00e8s Falcone, Borzoo Bonakdarpour, Christian Colombo, Normann Decker, Klaus Havelund, Yogi Joshi, Felix Klaedtke, Reed Milewicz, Giles Reger, Grigore Ro\u015fu, Julien Signoles, Daniel Thoma, Eugen Zalinescu, and Yi Zhang. 2019. First international Competition on Runtime Verification: Rules, benchmarks, tools, and final results. IJSTTT, 21, 1 (2019)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Ezio Bartocci Yli\u00e8s Falcone Adrian Francalanza and Giles Reger. 2018. Introduction to Runtime Verification. In Lectures on Runtime Verification.","DOI":"10.1007\/978-3-319-75632-5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Ezio Bartocci Yli\u00e8s Falcone and Giles Reger. 2019. International Competition on Runtime Verification. In TACAS.","DOI":"10.1007\/978-3-319-75632-5"},{"key":"e_1_3_2_1_17_1","unstructured":"David Basin Felix Klaedtke and Eugen Z\u0103linescu. 2015. Failure-aware runtime verification of distributed systems. In FSTTCS."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"David Basin Felix Klaedtke and Eugen Z\u0103linescu. 2017. Runtime verification of temporal properties over out-of-order data streams. In CAV.","DOI":"10.1007\/978-3-319-63387-9_18"},{"key":"e_1_3_2_1_19_1","volume-title":"Efficient decentralized LTL monitoring framework using tableau technique. TECS, 18, 5s","author":"Bataineh Omar","year":"2019","unstructured":"Omar Bataineh, David S Rosenblum, and Mark Reynolds. 2019. Efficient decentralized LTL monitoring framework using tableau technique. TECS, 18, 5s (2019)."},{"key":"e_1_3_2_1_20_1","unstructured":"Andreas Bauer. 2010. Monitorability of Omega-regular languages. arXiv preprint arXiv:1006.3638."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Andreas Bauer and Ylies Falcone. 2012. Decentralised LTL monitoring. In FM.","DOI":"10.1007\/978-3-642-32759-9_10"},{"key":"e_1_3_2_1_22_1","unstructured":"2024. Bazel Home Page. https:\/\/bazel.build"},{"key":"e_1_3_2_1_23_1","unstructured":"Jon Bell Owolabi Legunsen Michael Hilton Lamyaa Eloussi Tifany Yung and Darko Marinov. 2018. DeFlaker: Automatically Detecting Flaky Tests. In ICSE."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Stephen M. Blackburn Robin Garner Chris Hoffmann Asjad M. Khang Kathryn S. McKinley Rotem Bentzur Amer Diwan Daniel Feinberg Daniel Frampton Samuel Z. Guyer Martin Hirzel Antony Hosking Maria Jump Han Lee J. Eliot B. Moss Aashish Phansalkar Darko Stefanovi\u0107 Thomas VanDrunen Daniel von Dincklage and Ben Wiedermann. 2006. The DaCapo Benchmarks: Java Benchmarking Development and Analysis. In OOPSLA.","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Eric Bodden. 2011. MOPBox: A Library Approach to Runtime Verification. In RV.","DOI":"10.1007\/978-3-642-29860-8_28"},{"key":"e_1_3_2_1_26_1","volume-title":"Naeem","author":"Bodden Eric","year":"2007","unstructured":"Eric Bodden, Laurie Hendren, Patrick Lam, Ond\u0159ej Lhot\u00e1k, and Nomair A. Naeem. 2007. Collaborative Runtime Verification with Tracematches. In RV."},{"key":"e_1_3_2_1_27_1","unstructured":"Eric Bodden Laurie Hendren and Ondrej Lhot\u00e1k. 2007. A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring. In ECOOP."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Eric Bodden Patrick Lam and Laurie Hendren. 2008. Finding Programming Errors Earlier by Evaluating Runtime Monitors Ahead-of-time. In FSE.","DOI":"10.1145\/1453101.1453109"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Borzoo Bonakdarpour Samaneh Navabpour and Sebastian Fischmeister. 2013. Time-triggered runtime verification. In FMSD. 43.","DOI":"10.1007\/s10703-012-0182-0"},{"key":"e_1_3_2_1_30_1","unstructured":"Glenn Bruns and Patrice Godefroid. 2001. Temporal logic query checking. In LICS."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Ian Cassar Adrian Francalanza Luca Aceto and Anna Ing\u00f3lfsd\u00f3ttir. 2017. A survey of runtime monitoring instrumentation techniques. arXiv preprint arXiv:1708.07229.","DOI":"10.4204\/EPTCS.254.2"},{"key":"e_1_3_2_1_32_1","volume-title":"Dongyun Jin, and Grigore Ro\u015fu.","author":"Chen Feng","year":"2009","unstructured":"Feng Chen, Patrick O\u2019Neil Meredith, Dongyun Jin, and Grigore Ro\u015fu. 2009. Efficient formalism-independent monitoring of parametric properties. In ASE."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Feng Chen and Grigore Ro\u015fu. 2003. Towards Monitoring-Oriented Programming: A paradigm combining specification and implementation. In RV.","DOI":"10.1016\/S1571-0661(04)81045-4"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Feng Chen and Grigore Ro\u015fu. 2009. Parametric trace slicing and monitoring. In TACAS.","DOI":"10.1007\/978-3-642-00768-2_23"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Marcelo d\u2019Amorim and Klaus Havelund. 2005. Event-based runtime verification of Java programs. In WODA.","DOI":"10.1145\/1083246.1083249"},{"key":"e_1_3_2_1_36_1","unstructured":"Ben d\u2019Angelo Sriram Sankaranarayanan C\u00e9sar S\u00e1nchez Will Robinson Bernd Finkbeiner Henny B Sipma Sandeep Mehrotra and Zohar Manna. 2005. LOLA: runtime monitoring of synchronous systems. In Temporal Representation and Reasoning."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Luis Miguel Danielsson and C\u00e9sar S\u00e1nchez. 2019. Decentralized stream runtime verification. In RV.","DOI":"10.1007\/978-3-030-32079-9_11"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Normann Decker Jannis Harder Torben Scheffel Malte Schmitz and Daniel Thoma. 2016. Runtime Monitoring with Union-Find Structures. In TACAS.","DOI":"10.1007\/978-3-662-49674-9_54"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Normann Decker Martin Leucker and Daniel Thoma. 2013. jUnit RV\u2013adding runtime verification to jUnit. In FM.","DOI":"10.1007\/978-3-642-38088-4_34"},{"key":"e_1_3_2_1_40_1","volume-title":"monitorable properties and runtime verification. TCS, 537","author":"Diekert Volker","year":"2014","unstructured":"Volker Diekert and Martin Leucker. 2014. Topology, monitorable properties and runtime verification. TCS, 537 (2014)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Matthew B. Dwyer Rahul Purandare and Suzette Person. 2010. Runtime Verification in Context: Can Optimizing Error Detection Improve Fault Diagnosis? In RV.","DOI":"10.1007\/978-3-642-16612-9_4"},{"key":"e_1_3_2_1_42_1","unstructured":"U. Erlingsson and F. B. Schneider. 2000. IRM enforcement of Java stack inspection. In IEEE S&P."},{"key":"e_1_3_2_1_43_1","volume-title":"What can you verify and enforce at runtime? IJSTTT, 14","author":"Falcone Yli\u00e8s","year":"2012","unstructured":"Yli\u00e8s Falcone, Jean-Claude Fernandez, and Laurent Mounier. 2012. What can you verify and enforce at runtime? IJSTTT, 14 (2012)."},{"key":"e_1_3_2_1_44_1","unstructured":"Yli\u00e8s Falcone Klaus Havelund and Giles Reger. 2013. A Tutorial on Runtime Verification. In Engineering Dependable Software Systems."},{"key":"e_1_3_2_1_45_1","volume-title":"Giles Reger, and Dmitriy Traytel.","author":"Falcone Yli\u00e8s","year":"2018","unstructured":"Yli\u00e8s Falcone, Sr\u0111 an Krsti\u0107, Giles Reger, and Dmitriy Traytel. 2018. A Taxonomy for Classifying Runtime Verification Tools. In RV."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Yli\u00e8s Falcone Dejan Ni\u010dkovi\u0107 Giles Reger and Daniel Thoma. 2015. Second International Competition on Runtime Verification. In RV.","DOI":"10.1007\/978-3-319-23820-3_27"},{"key":"e_1_3_2_1_47_1","volume-title":"Ian Cassar, Dario Della Monica, and Anna Ing\u00f3lfsd\u00f3ttir.","author":"Francalanza Adrian","year":"2017","unstructured":"Adrian Francalanza, Luca Aceto, Antonis Achilleos, Duncan Paul Attard, Ian Cassar, Dario Della Monica, and Anna Ing\u00f3lfsd\u00f3ttir. 2017. A foundation for runtime monitoring. In RV."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Adrian Francalanza Jorge A P\u00e9rez and C\u00e9sar S\u00e1nchez. 2018. Runtime verification for decentralised and distributed systems. Lectures on Runtime Verification.","DOI":"10.1007\/978-3-319-75632-5_6"},{"key":"e_1_3_2_1_49_1","unstructured":"Ritam Ganguly Anik Momtaz and Borzoo Bonakdarpour. 2021. Distributed runtime verification under partial synchrony. In OPODIS."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Ritam Ganguly Yingjie Xue Aaron Jonckheere Parker Ljung Benjamin Schornstein Borzoo Bonakdarpour and Maurice Herlihy. 2022. Distributed Runtime Verification of Metric Temporal Properties for Cross-Chain Protocols. In ICDCS.","DOI":"10.1109\/ICDCS54860.2022.00012"},{"key":"e_1_3_2_1_51_1","volume-title":"Distributed runtime verification of metric temporal properties. J. Parallel and Distrib. Comput., 185","author":"Ganguly Ritam","year":"2024","unstructured":"Ritam Ganguly, Yingjie Xue, Aaron Jonckheere, Parker Ljung, Benjamin Schornstein, Borzoo Bonakdarpour, and Maurice Herlihy. 2024. Distributed runtime verification of metric temporal properties. J. Parallel and Distrib. Comput., 185 (2024)."},{"key":"e_1_3_2_1_52_1","unstructured":"2008. TotT: Avoiding Flakey Tests. http:\/\/goo.gl\/vHE47r"},{"key":"e_1_3_2_1_53_1","volume-title":"Striver: Stream runtime verification for real-time event-streams. In RV.","author":"Gorostiaga Felipe","year":"2018","unstructured":"Felipe Gorostiaga and C\u00e9sar S\u00e1nchez. 2018. Striver: Stream runtime verification for real-time event-streams. In RV."},{"key":"e_1_3_2_1_54_1","unstructured":"2024. Gradle Home Page. https:\/\/gradle.org"},{"key":"e_1_3_2_1_55_1","unstructured":"2024. ARTCAT: Autonomic Response To Cyber-Attack. https:\/\/grammatech.github.io\/prj\/artcat"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Alex Gyori Ben Lambeth August Shi Owolabi Legunsen and Darko Marinov. 2016. NonDex: A tool for detecting and debugging wrong assumptions on Java API specifications. In FSE Demo.","DOI":"10.1145\/2950290.2983932"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Alex Gyori Owolabi Legunsen Farah Hariri and Darko Marinov. 2018. Evaluating regression test selection opportunities in a very large open-source ecosystem. In ISSRE.","DOI":"10.1109\/ISSRE.2018.00022"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Mary Jean Harrold James A. Jones Tongyu Li Donglin Liang Alessandro Orso Maikel Pennings Saurabh Sinha S. Alexander Spoon and Ashish Gujarathi. 2001. Regression Test Selection for Java Software. In OOPSLA.","DOI":"10.1145\/504311.504305"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Klaud Havelund and Doron Peled. 2023. Monitorability for Runtime Verification. In RV.","DOI":"10.1007\/978-3-031-44267-4_25"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Klaus Havelund Doron Peled and Dogan Ulus. 2017. First order temporal logic monitoring with BDDs. In FMSD.","DOI":"10.23919\/FMCAD.2017.8102249"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Klaus Havelund and Grigore Ro\u015fu. 2001. Monitoring Java Programs with Java PathExplorer. In RV.","DOI":"10.1016\/S1571-0661(04)00253-1"},{"key":"e_1_3_2_1_63_1","unstructured":"Klaus Havelund and Grigore Ro\u015fu. 2001. Monitoring Programs Using Rewriting. In ASE."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Klaus Havelund and Grigore Ro\u015fu. 2002. Synthesizing Monitors for Safety Properties. In TACAS.","DOI":"10.1007\/3-540-46002-0_24"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Thomas A Henzinger and N Ege Sara\u00e7. 2020. Monitorability under assumptions. In RV.","DOI":"10.1007\/978-3-030-60508-7_1"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Michael Hilton Nicholas Nelson Timothy Tunnell Darko Marinov and Danny Dig. 2017. Trade-offs in continuous integration: assurance security and flexibility. In FSE.","DOI":"10.1145\/3106237.3106270"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Michael Hilton Timothy Tunnell Kai Huang Darko Marinov and Danny Dig. 2016. Usage costs and benefits of continuous integration in open-source projects. In ASE.","DOI":"10.1145\/2970276.2970358"},{"key":"e_1_3_2_1_68_1","unstructured":"Hsi-Ming Ho Jo\u00ebl Ouaknine and James Worrell. 2014. Online monitoring of metric temporal logic. In RV."},{"key":"e_1_3_2_1_69_1","unstructured":"2016. Supplementary Material for Paper LegunsenETALASE2016SpecEval. https:\/\/www.cs.cornell.edu\/ legunsen\/spec-eval"},{"key":"e_1_3_2_1_70_1","volume-title":"Temporal-logic query checking over finite data streams. IJSTTT, 24, 3","author":"Huang Samuel","year":"2022","unstructured":"Samuel Huang and Rance Cleaveland. 2022. Temporal-logic query checking over finite data streams. IJSTTT, 24, 3 (2022)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Soha Hussein Patrick Meredith and Grigore Ro\u015fu. 2012. Security-Policy Monitoring and Enforcement with JavaMOP. In PLAS.","DOI":"10.1145\/2336717.2336720"},{"key":"e_1_3_2_1_72_1","unstructured":"2024. JavaMOP Team. https:\/\/github.com\/runtimeverification\/javamop"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"O. Javed and W. Binder. 2018. Large-Scale Evaluation of the Efficiency of Runtime-Verification Tools in the Wild. In APSEC.","DOI":"10.1109\/APSEC.2018.00091"},{"key":"e_1_3_2_1_74_1","unstructured":"2024. How IntelliJ IDEA profiler works. https:\/\/www.jetbrains.com\/help\/idea\/cpu-and-allocation-profiling-basic-concepts.html"},{"key":"e_1_3_2_1_75_1","volume-title":"Dennis Griffith, and Grigore Ro\u015fu.","author":"Jin Dongyun","year":"2011","unstructured":"Dongyun Jin, Patrick O\u2019Neil Meredith, Dennis Griffith, and Grigore Ro\u015fu. 2011. Garbage Collection for Monitoring Parametric Properties. In PLDI."},{"key":"e_1_3_2_1_76_1","volume-title":"Choonghwan Lee, and Grigore Ro\u015fu.","author":"Jin Dongyun","year":"2012","unstructured":"Dongyun Jin, Patrick O\u2019Neil Meredith, Choonghwan Lee, and Grigore Ro\u015fu. 2012. JavaMOP: Efficient Parametric Runtime Monitoring Framework. In ICSE Demo."},{"key":"e_1_3_2_1_77_1","volume-title":"Patrick O\u2019Neil Meredith, and Grigore Ro\u015fu","author":"Jin Dongyun","year":"2012","unstructured":"Dongyun Jin, Patrick O\u2019Neil Meredith, and Grigore Ro\u015fu. 2012. Scalable Parametric Runtime Monitoring. Computer Science Dept., UIUC."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Murat Karaorman and Jay Freeman. 2004. jMonitor: Java runtime event specification and monitoring library. In RV.","DOI":"10.1016\/j.entcs.2004.01.027"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Gregor Kiczales Erik Hilsdale Jim Hugunin Mik Kersten Jeffrey Palm and William G Griswold. 2001. An overview of AspectJ. In ECOOP.","DOI":"10.1007\/3-540-45337-7_18"},{"key":"e_1_3_2_1_80_1","unstructured":"Moonjoo Kim Mahesh Viswanathan Hanene Ben-Abdallah Sampath Kannan Insup Lee and Oleg Sokolsky. 1999. Formally specified monitoring of temporal properties. In ECRTS."},{"key":"e_1_3_2_1_81_1","volume-title":"Class firewall, test order, and regression testing of object-oriented programs. JOOP, 8, 2","author":"Kung David Chenho","year":"1995","unstructured":"David Chenho Kung, Jerry Gao, Pei Hsia, Jeremy Lin, and Yasufumi Toyoshima. 1995. Class firewall, test order, and regression testing of object-oriented programs. JOOP, 8, 2 (1995)."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"crossref","unstructured":"Wing Lam Reed Oei August Shi Darko Marinov and Tao Xie. 2019. iDFlakies: A framework for detecting and partially classifying flaky tests. In ICST.","DOI":"10.1109\/ICST.2019.00038"},{"key":"e_1_3_2_1_83_1","volume-title":"Patrick O\u2019Neil Meredith, and Grigore Ro\u015fu","author":"Lee Choonghwan","year":"2012","unstructured":"Choonghwan Lee, Dongyun Jin, Patrick O\u2019Neil Meredith, and Grigore Ro\u015fu. 2012. Towards Categorizing and Formalizing the JDK API. Computer Science Dept., UIUC."},{"key":"e_1_3_2_1_84_1","article-title":"How Effective are Existing Java API Specifications for Finding Bugs During Runtime Verification","volume":"26","author":"Legunsen Owolabi","year":"2019","unstructured":"Owolabi Legunsen, Nader Al Awar, Xinyue Xu, Wajih Ul Hassan, Grigore Ro\u015fu, and Darko Marinov. 2019. How Effective are Existing Java API Specifications for Finding Bugs During Runtime Verification? ASE Journal, 26, 4 (2019).","journal-title":"ASE Journal"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"crossref","unstructured":"Owolabi Legunsen Farah Hariri August Shi Yafeng Lu Lingming Zhang and Darko Marinov. 2016. An Extensive Study of Static Regression Test Selection in Modern Software Evolution. In FSE.","DOI":"10.1145\/2950290.2950361"},{"key":"e_1_3_2_1_86_1","volume-title":"Xinyue Xu, Grigore Ro\u015fu, and Darko Marinov.","author":"Legunsen Owolabi","year":"2016","unstructured":"Owolabi Legunsen, Wajih Ul Hassan, Xinyue Xu, Grigore Ro\u015fu, and Darko Marinov. 2016. How good are the specs? A study of the bug-finding effectiveness of existing Java API specifications. In ASE."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"crossref","unstructured":"Owolabi Legunsen Darko Marinov and Grigore Ro\u015fu. 2015. Evolution-aware monitoring-oriented programming. In ICSE NIER.","DOI":"10.1109\/ICSE.2015.206"},{"key":"e_1_3_2_1_88_1","volume-title":"STARTS: STAtic Regression Test Selection. In ASE.","author":"Legunsen Owolabi","year":"2017","unstructured":"Owolabi Legunsen, August Shi, and Darko Marinov. 2017. STARTS: STAtic Regression Test Selection. In ASE."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"crossref","unstructured":"Owolabi Legunsen Yi Zhang Milica Hadzi-Tanovic Grigore Ro\u015fu and Darko Marinov. 2019. Techniques for Evolution-Aware Runtime Verification. In ICST.","DOI":"10.1109\/ICST.2019.00037"},{"key":"e_1_3_2_1_90_1","unstructured":"Martin Leucker and Christian Schallhart. 2007. A brief account of runtime verification. In FLACOS."},{"key":"e_1_3_2_1_91_1","volume-title":"Leung and Lee White","author":"Hareton","year":"1990","unstructured":"Hareton K.N. Leung and Lee White. 1990. A study of integration testing and software regression at the integration level. In ICSM."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"crossref","unstructured":"Yu Liu Jiyang Zhang Pengyu Nie Milos Gligoric and Owolabi Legunsen. 2023. More precise regression test selection via reasoning about semantics-modifying changes. In ISSTA.","DOI":"10.1145\/3597926.3598086"},{"key":"e_1_3_2_1_93_1","unstructured":"Qingzhou Luo Farah Hariri Lamyaa Eloussi and Darko Marinov. 2014. An empirical analysis of flaky tests. In FSE."},{"key":"e_1_3_2_1_94_1","volume-title":"Traian Florin \u015eerb\u0103nu\u0163\u0103, and Grigore Ro\u015fu.","author":"Luo Qingzhou","year":"2014","unstructured":"Qingzhou Luo, Yi Zhang, Choonghwan Lee, Dongyun Jin, Patrick O\u2019Neil Meredith, Traian Florin \u015eerb\u0103nu\u0163\u0103, and Grigore Ro\u015fu. 2014. RV-Monitor: Efficient Parametric Runtime Verification with Simultaneous Properties. In RV."},{"key":"e_1_3_2_1_95_1","unstructured":"Luk\u00e1\u0161 Marek Alex Villaz\u00f3n Yudi Zheng Danilo Ansaloni Walter Binder and Zhengwei Qi. 2012. DiSL: A domain-specific language for bytecode instrumentation. In AOSD."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"crossref","unstructured":"Michael Martin Benjamin Livshits and Monica S Lam. 2005. Finding application errors and security flaws using PQL: a program query language. In OOPSLA.","DOI":"10.1145\/1094811.1094840"},{"key":"e_1_3_2_1_97_1","unstructured":"2024. Matplotlib: Visualization with Python. https:\/\/matplotlib.org"},{"key":"e_1_3_2_1_98_1","volume-title":"Cohen","author":"Memon Atif M.","year":"2013","unstructured":"Atif M. Memon and Myra B. Cohen. 2013. Automated testing of GUI applications: models, tools, and controlling flakiness. In ICSE."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"crossref","unstructured":"P.O. Meredith Dongyun Jin Feng Chen and G. Ro\u015fu. 2008. Efficient Monitoring of Parametric Context-Free Patterns. In ASE.","DOI":"10.1109\/ASE.2008.25"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"crossref","unstructured":"Patrick Meredith and Grigore Ro\u015fu. 2013. Efficient Parametric Runtime Verification with Deterministic String Rewriting. In ASE.","DOI":"10.1109\/ASE.2013.6693067"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"crossref","unstructured":"Breno Miranda Igor Lima Owolabi Legunsen and Marcelo d\u2019Amorim. 2020. Prioritizing Runtime Verification Violations. In ICST.","DOI":"10.1109\/ICST46399.2020.00038"},{"key":"e_1_3_2_1_102_1","unstructured":"2014. How Etsy Deploys More Than 50 Times a Day. https:\/\/www.infoq.com\/news\/2014\/03\/etsy-deploy-50-times-a-day"},{"key":"e_1_3_2_1_103_1","unstructured":"2017. JaCoCo Java Code Coverage Library. http:\/\/www.eclemma.org\/jacoco\/"},{"key":"e_1_3_2_1_104_1","volume-title":"Borzoo Bonakdarpour, and Sebastian Fischmeister.","author":"Navabpour Samaneh","year":"2011","unstructured":"Samaneh Navabpour, Chun Wah Wallace Wu, Borzoo Bonakdarpour, and Sebastian Fischmeister. 2011. Efficient Techniques for Near-Optimal Instrumentation in Time-Triggered Runtime Verification. In RV."},{"key":"e_1_3_2_1_105_1","volume-title":"Raymond J. Mooney, and Milos Gligoric.","author":"Nie Pengyu","year":"2023","unstructured":"Pengyu Nie, Rahul Banerjee, Junyi Jessy Li, Raymond J. Mooney, and Milos Gligoric. 2023. Learning Deep Semantics for Test Completion. In ICSE."},{"key":"e_1_3_2_1_106_1","unstructured":"Vinit A Ogale and Vijay K Garg. 2007. Detecting temporal logic predicates on distributed computations. In DISC."},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"crossref","unstructured":"Peter W O\u2019Hearn. 2018. Continuous reasoning: Scaling the impact of formal methods. In LICS.","DOI":"10.1145\/3209108.3209109"},{"key":"e_1_3_2_1_108_1","unstructured":"2024. Collections API. https:\/\/docs.oracle.com\/en\/java\/javase\/17\/docs\/api\/java.base\/java\/util\/Collections.html#synchronizedCollection(java.util.Collection)"},{"key":"e_1_3_2_1_109_1","unstructured":"Alessandro Orso Nanjuan Shi and Mary Jean Harrold. 2004. Scaling regression testing to large software systems. In FSE."},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"crossref","unstructured":"Fabio Palomba and Andy Zaidman. 2017. Does refactoring of test smells induce fixing flaky tests? In ICSME.","DOI":"10.1109\/ICSME.2017.12"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"crossref","unstructured":"Rahul Purandare Matthew B. Dwyer and Sebastian Elbaum. 2010. Monitor Optimization via Stutter-equivalent Loop Transformation. In OOPSLA.","DOI":"10.1145\/1869459.1869483"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"crossref","unstructured":"Rahul Purandare Matthew B. Dwyer and Sebastian Elbaum. 2013. Optimizing Monitoring of Finite State Properties Through Monitor Compaction. In ISSTA.","DOI":"10.1145\/2483760.2483762"},{"key":"e_1_3_2_1_113_1","volume-title":"Helena Cuenca Cruz, and David Rydeheard","author":"Reger Giles","year":"2015","unstructured":"Giles Reger, Helena Cuenca Cruz, and David Rydeheard. 2015. MarQ: Monitoring at Runtime with QEA. In TACAS."},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"crossref","unstructured":"Giles Reger Sylvain Hall\u00e9 and Yli\u00e8s Falcone. 2016. Third International Competition on Runtime Verification. In RV.","DOI":"10.1007\/978-3-319-46982-9_3"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"crossref","unstructured":"David Georg Reichelt Lubom\u00edr Bulej Reiner Jung and Andr\u00e9 van Hoorn. 2024. Overhead Comparison of Instrumentation Frameworks. In ICPE.","DOI":"10.1145\/3629527.3652269"},{"key":"e_1_3_2_1_116_1","unstructured":"Adam Renberg. 2014. Test-inspired runtime verification: Using a unit test-like specification syntax for runtime verification. Master\u2019s thesis. KTH. Sweden."},{"key":"e_1_3_2_1_117_1","article-title":"On safety properties and their monitoring","volume":"22","author":"Rosu Grigore","year":"2012","unstructured":"Grigore Rosu. 2012. On safety properties and their monitoring. Scientific Annals of Computer Science, 22, 2 (2012).","journal-title":"Scientific Annals of Computer Science"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"crossref","unstructured":"Grigore Ro\u015fu and Saddek Bensalem. 2006. Allen Linear (Interval) Temporal Logic \u2013 Translation to LTL and Monitor Synthesis. In CAV.","DOI":"10.1007\/11817963_25"},{"key":"e_1_3_2_1_119_1","unstructured":"2024. Performance regression that we find in. https:\/\/github.com\/runtimeverification\/rv-monitor\/commit\/884f9622f"},{"key":"e_1_3_2_1_120_1","volume-title":"Enforceable Security Policies. TISSEC, 3, 1","author":"Schneider Fred B.","year":"2000","unstructured":"Fred B. Schneider. 2000. Enforceable Security Policies. TISSEC, 3, 1 (2000)."},{"key":"e_1_3_2_1_121_1","unstructured":"Koushik Sen Grigore Ro\u015fu and Gul Agha. 2003. Generating Optimal Linear Temporal Logic Monitors by Coinduction. In Advances in Computing Science."},{"key":"e_1_3_2_1_122_1","unstructured":"Koushik Sen Abhay Vardhan Gul Agha and Grigore Rosu. 2004. Efficient decentralized monitoring of safety in distributed systems. In ICSE."},{"key":"e_1_3_2_1_123_1","unstructured":"August Shi Alex Gyori Owolabi Legunsen and Darko Marinov. 2016. Detecting Assumptions on Deterministic Implementations of Non-deterministic Specifications. In ICST."},{"key":"e_1_3_2_1_124_1","unstructured":"August Shi Milica Hadzi-Tanovic Lingming Zhang Darko Marinov and Owolabi Legunsen. 2019. Reflection-Aware Static Regression Test Selection. In OOPSLA."},{"key":"e_1_3_2_1_125_1","unstructured":"August Shi Wing Lam Reed Oei Tao Xie and Darko Marinov. 2019. iFixFlakies: A framework for automatically fixing order-dependent flaky tests. In FSE."},{"key":"e_1_3_2_1_126_1","unstructured":"August Shi Peiyuan Zhao and Darko Marinov. 2019. Understanding and Improving Regression Test Selection in Continuous Integration. In ISSRE."},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"crossref","unstructured":"Chukri Soueidi and Yli\u00e8s Falcone. 2023. Bridging the Gap: A Focused DSL for RV-Oriented Instrumentation with BISM. In RV.","DOI":"10.1007\/978-3-031-44267-4_17"},{"key":"e_1_3_2_1_128_1","doi-asserted-by":"crossref","unstructured":"Chukri Soueidi and Yli\u00e8s Falcone. 2023. Instrumentation for RV: From Basic Monitoring to Advanced Use Cases. In RV.","DOI":"10.1007\/978-3-031-44267-4_23"},{"key":"e_1_3_2_1_129_1","doi-asserted-by":"crossref","unstructured":"Chukri Soueidi Yli\u00e8s Falcone and Sylvain Hall\u00e9. 2023. Dynamic Program Analysis with Flexible Instrumentation and Complex Event Processing. In ISSRE.","DOI":"10.1109\/ISSRE59848.2023.00048"},{"key":"e_1_3_2_1_130_1","volume-title":"Efficient and expressive bytecode-level instrumentation for Java programs. IJSTTT, 25, 4","author":"Soueidi Chukri","year":"2023","unstructured":"Chukri Soueidi, Marius Monnier, and Yli\u00e8s Falcone. 2023. Efficient and expressive bytecode-level instrumentation for Java programs. IJSTTT, 25, 4 (2023)."},{"key":"e_1_3_2_1_131_1","unstructured":"2024. STARTS\u2014A tool for STAtic Regression Test Selection. https:\/\/github.com\/TestingResearchIllinois\/starts"},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"crossref","unstructured":"Leopoldo Teixeira Breno Miranda Henrique Reb\u00ealo and Marcelo d\u2019Amorim. 2021. Demystifying the challenges of formally specifying API properties for runtime verification. In ICST.","DOI":"10.1109\/ICST49551.2021.00020"},{"key":"e_1_3_2_1_133_1","doi-asserted-by":"crossref","unstructured":"Prasanna Thati and Grigore Rosu. 2004. Monitoring Algorithms for Metric Temporal Logic Specifications. In RV.","DOI":"10.1016\/j.entcs.2004.01.029"},{"key":"e_1_3_2_1_134_1","volume-title":"Runtime Verification of Crypto APIs: An Empirical Study. TSE, 49, 10","author":"Torres Adriano","year":"2023","unstructured":"Adriano Torres, Pedro Costa, Luis Amaral, Jonata Pastro, Rodrigo Bonif\u00e1cio, Marcelo d\u2019Amorim, Owolabi Legunsen, Eric Bodden, and Edna Dias Canedo. 2023. Runtime Verification of Crypto APIs: An Empirical Study. TSE, 49, 10 (2023)."},{"key":"e_1_3_2_1_135_1","unstructured":"Chun Wah Wallace Wu Deepak Kumar Borzoo Bonakdarpour and Sebastian Fischmeister. 2013. Reducing Monitoring Overhead by Integrating Event- and Time-Triggered Techniques. In RV."},{"key":"e_1_3_2_1_136_1","volume-title":"Aragog: Scalable runtime verification of shardable networked systems. In OSDI.","author":"Yaseen Nofel","year":"2020","unstructured":"Nofel Yaseen, Behnaz Arzani, Ryan Beckett, Selim Ciraci, and Vincent Liu. 2020. Aragog: Scalable runtime verification of shardable networked systems. In OSDI."},{"key":"e_1_3_2_1_137_1","doi-asserted-by":"crossref","unstructured":"S. Yoo and M. Harman. 2012. Regression Testing Minimization Selection and Prioritization: A Survey. STVR 22 2 (2012).","DOI":"10.1002\/stv.430"},{"key":"e_1_3_2_1_138_1","doi-asserted-by":"crossref","unstructured":"Ayaka Yorihiro Pengyue Jiang Valeria Marques Benjamin Carleton and Owolabi Legunsen. 2023. eMOP: A Maven Plugin for Evolution-Aware Runtime Verification. In RV.","DOI":"10.1007\/978-3-031-44267-4_20"},{"key":"e_1_3_2_1_139_1","doi-asserted-by":"crossref","unstructured":"Jiyang Zhang Yu Liu Milos Gligoric Owolabi Legunsen and August Shi. 2022. Comparing and combining analysis-based and learning-based regression test selection. In ASE.","DOI":"10.1145\/3524481.3527230"},{"key":"e_1_3_2_1_140_1","doi-asserted-by":"crossref","unstructured":"Lingming Zhang. 2018. Hybrid Regression Test Selection. In ICSE.","DOI":"10.1145\/3180155.3180198"},{"key":"e_1_3_2_1_141_1","unstructured":"Chenguang Zhu Owolabi Legunsen August Shi and Milos Gligoric. 2019. A framework for checking regression test selection tools. In ICSE."}],"event":{"name":"ISSTA '24: 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Vienna Austria","acronym":"ISSTA '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3680400","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650212.3680400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:09Z","timestamp":1750294689000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3680400"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":141,"alternative-id":["10.1145\/3650212.3680400","10.1145\/3650212"],"URL":"https:\/\/doi.org\/10.1145\/3650212.3680400","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2024-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}