SlideShare a Scribd company logo
1 of 19
On Adequate Behavior-based
Architecture Conformance Checks
Ana Nicolaescu
Horst Lichter
RWTH Aachen University
Veit Hoffmann
Generali Deutschland Informatik Services
What is a Software Architecture (Description)
“fundamental concepts or properties of a system in its environment embodied in its
elements, relationships, and in the principles of its design and evolution” (ISO/IEC/IEEE 42010)
2
Logical/Static View Development View
Physical ViewProcess/Behavior View
Scenarios
Kruchten’s 4+1
Conformance Checking?
3
conformance checking = a process conducted to reveal the drift emerged between the intended
and the implemented architecture of a system
Static Conformance Checking
4
Cheap
Scalable
Tool-Supported
Complete (in its scope)
Relies on available input
Static vs. Behavior View
5
Relation Behavior View Static View
Method Invocation / Instantiation Yes Yes
Extends / Implements / Import /
Variable Access
No Yes
Multi-process / Heterogenuos
Subsystems
Yes No
Remoting (REST, Queue, ...) /
Dynamic Usage (Reflection, DI, ...)
Yes No
Execution Frequency / Time / Order Yes No
Behavior-based Conformance Checks
6
● “It is a challenge for dynamic compliance checking to select
the right system execution scenario“ (Knodel et et al., 2008)
● “A challenge faced by any dynamic program monitoring tool
is ensuring sufficient execution coverage” (De Silva and Balasubramaniam, 2013)
● The extracted architectural facts are as good as the code
coverage (Ganesan et al., 2008)
Adequacy of Behavior-based Conformance Checks
7
● Behavior-relevant rules
applied on….
● Architecturally-relevant behavior
Static vs. Behavior-based Conformance Checking
8
3
1217
ARAMIS Sonargraph
Architect
4 are in the scope of ARAMIS
ARAMIS vs. Sonargraph - number of violation types
file-systems violations
performance issues
use of external dependencies
ARAMIS
9
● ARchitectural Analysis and Monitoring InfraStructure
● Behavior-based architecture conformance checking
● Monitor & analyze communication
● Detect violations against specified
architecture rules
ARAMIS
Communication Rules in ARAMIS
10
Communication Rules in ARAMIS - Example
11
ValidatingMappingAdapting
Extracting
Implemented
Architecture
Description
Communication
Violations
ARAMIS
Workflow
Communication
Rules
Intended
Architecture
Description
Communication Rules in ARAMIS - Example
12
ValidatingMappingAdapting
Extracting
Implemented
Architecture
Description
Communication
Violations
ARAMIS
Workflow
Communication
Rules
Intended
Architecture
Description
Conformance Checking of ARAMIS
13
MappingAdapting
ValidatingMapping
Conformance Checking of ARAMIS
14
Nb. of Rules 19
Nb. of Violation Types 2
Statement Coverage 51%
Relevant Scenarios
Context VarietyScenario Coverage 75%
Adequacy of Behavior-based Conformance Checks
15
● Behavior-relevant rules
applied on….
● Architecturally-relevant behavior
The Scenario Coverage Metric
16
Second Evaluation
17
Scenario Coverage 58%
Second Evaluation
18
Scenario Coverage 88% Statement Coverage 34%
Conslusions
19
ARAMIS

More Related Content

What's hot

Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...Tim Menzies
 
Matlab Programming Assignment help , Matlab Programming Online tutors
Matlab Programming Assignment help , Matlab Programming Online tutorsMatlab Programming Assignment help , Matlab Programming Online tutors
Matlab Programming Assignment help , Matlab Programming Online tutorsjohn mayer
 
Differences asked in Software Testing Interview.
Differences asked in Software Testing Interview. Differences asked in Software Testing Interview.
Differences asked in Software Testing Interview. Siddharth Sharma
 
Fractional differential equations Assignment Help and Fractional differential...
Fractional differential equations Assignment Help and Fractional differential...Fractional differential equations Assignment Help and Fractional differential...
Fractional differential equations Assignment Help and Fractional differential...john mayer
 
Modeling Clinical Workflow
Modeling Clinical WorkflowModeling Clinical Workflow
Modeling Clinical Workflowstavery
 
UML Diagram Assignment help , UML Diagram Online tutors
UML Diagram Assignment help , UML Diagram Online tutorsUML Diagram Assignment help , UML Diagram Online tutors
UML Diagram Assignment help , UML Diagram Online tutorsjohn mayer
 
Lecture 20 software testing (2)
Lecture 20   software testing (2)Lecture 20   software testing (2)
Lecture 20 software testing (2)IIUI
 
Robustness testing
Robustness testingRobustness testing
Robustness testingCS, NcState
 
Ergonomics Assignment Help and Ergonomics Online Tutors
Ergonomics Assignment Help and Ergonomics Online TutorsErgonomics Assignment Help and Ergonomics Online Tutors
Ergonomics Assignment Help and Ergonomics Online Tutorsjohn mayer
 
Computer Network Assignment help , Computer Network Online tutors
Computer Network Assignment help , Computer Network Online tutorsComputer Network Assignment help , Computer Network Online tutors
Computer Network Assignment help , Computer Network Online tutorsjohn mayer
 
System testing
System testingSystem testing
System testingMani Kanth
 
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...Mechanical engineering drawing Assignment Help and Mechanical engineering dra...
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...john mayer
 
Computer Science Assignment help , Computer Science Online tutors
Computer Science Assignment help , Computer Science Online tutorsComputer Science Assignment help , Computer Science Online tutors
Computer Science Assignment help , Computer Science Online tutorsjohn mayer
 
Testing throughout the software life cycle
Testing throughout the software life cycleTesting throughout the software life cycle
Testing throughout the software life cycleadeafsa
 
Understanding the Rationale for Updating a Function's Comment
Understanding the Rationale for Updating a Function's CommentUnderstanding the Rationale for Updating a Function's Comment
Understanding the Rationale for Updating a Function's CommentSAIL_QU
 

What's hot (20)

System testing
System testingSystem testing
System testing
 
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
 
Income Tax Audit
Income Tax AuditIncome Tax Audit
Income Tax Audit
 
Matlab Programming Assignment help , Matlab Programming Online tutors
Matlab Programming Assignment help , Matlab Programming Online tutorsMatlab Programming Assignment help , Matlab Programming Online tutors
Matlab Programming Assignment help , Matlab Programming Online tutors
 
Differences asked in Software Testing Interview.
Differences asked in Software Testing Interview. Differences asked in Software Testing Interview.
Differences asked in Software Testing Interview.
 
Fractional differential equations Assignment Help and Fractional differential...
Fractional differential equations Assignment Help and Fractional differential...Fractional differential equations Assignment Help and Fractional differential...
Fractional differential equations Assignment Help and Fractional differential...
 
Modeling Clinical Workflow
Modeling Clinical WorkflowModeling Clinical Workflow
Modeling Clinical Workflow
 
UML Diagram Assignment help , UML Diagram Online tutors
UML Diagram Assignment help , UML Diagram Online tutorsUML Diagram Assignment help , UML Diagram Online tutors
UML Diagram Assignment help , UML Diagram Online tutors
 
Lecture 20 software testing (2)
Lecture 20   software testing (2)Lecture 20   software testing (2)
Lecture 20 software testing (2)
 
Robustness testing
Robustness testingRobustness testing
Robustness testing
 
Ergonomics Assignment Help and Ergonomics Online Tutors
Ergonomics Assignment Help and Ergonomics Online TutorsErgonomics Assignment Help and Ergonomics Online Tutors
Ergonomics Assignment Help and Ergonomics Online Tutors
 
Computer Network Assignment help , Computer Network Online tutors
Computer Network Assignment help , Computer Network Online tutorsComputer Network Assignment help , Computer Network Online tutors
Computer Network Assignment help , Computer Network Online tutors
 
System testing
System testingSystem testing
System testing
 
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...Mechanical engineering drawing Assignment Help and Mechanical engineering dra...
Mechanical engineering drawing Assignment Help and Mechanical engineering dra...
 
Computer Science Assignment help , Computer Science Online tutors
Computer Science Assignment help , Computer Science Online tutorsComputer Science Assignment help , Computer Science Online tutors
Computer Science Assignment help , Computer Science Online tutors
 
Testing throughout the software life cycle
Testing throughout the software life cycleTesting throughout the software life cycle
Testing throughout the software life cycle
 
Silverlight
SilverlightSilverlight
Silverlight
 
Qulaity strategy template
Qulaity strategy templateQulaity strategy template
Qulaity strategy template
 
SpecTRM
SpecTRMSpecTRM
SpecTRM
 
Understanding the Rationale for Updating a Function's Comment
Understanding the Rationale for Updating a Function's CommentUnderstanding the Rationale for Updating a Function's Comment
Understanding the Rationale for Updating a Function's Comment
 

Similar to On Adequate Behavior-based Architecture Conformance Checks

Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471vconovalov
 
Enterprise performance engineering solutions
Enterprise performance engineering solutionsEnterprise performance engineering solutions
Enterprise performance engineering solutionsInfosys
 
Keynote: Elastic Observability evolution and vision
  Keynote: Elastic Observability evolution and vision  Keynote: Elastic Observability evolution and vision
Keynote: Elastic Observability evolution and visionElasticsearch
 
System requirements engineering
System requirements engineeringSystem requirements engineering
System requirements engineeringAnimesh Chaturvedi
 
What is Platform Observability? An Overview
What is Platform Observability? An OverviewWhat is Platform Observability? An Overview
What is Platform Observability? An OverviewKumar Kolaganti
 
Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...Osama M. Khaled
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...ijfcstjournal
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...Run-time Monitoring-based Evaluation and Communication Integrity Validation o...
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...Ana Nicolaescu
 
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...CREST @ University of Adelaide
 
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...IOSR Journals
 
[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architectureIvano Malavolta
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1Robert Donald
 
Chapter 3 - Analytical Techniques
Chapter 3 - Analytical TechniquesChapter 3 - Analytical Techniques
Chapter 3 - Analytical TechniquesNeeraj Kumar Singh
 
Enterprise Software Architecture styles
Enterprise Software Architecture stylesEnterprise Software Architecture styles
Enterprise Software Architecture stylesAraf Karsh Hamid
 
Analysis and Control of Computing Systems
Analysis and Control of Computing SystemsAnalysis and Control of Computing Systems
Analysis and Control of Computing Systemsnorhavillegas
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...IJCSIS Research Publications
 

Similar to On Adequate Behavior-based Architecture Conformance Checks (20)

Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471Software Architecture Standard IEEE 1471
Software Architecture Standard IEEE 1471
 
Enterprise performance engineering solutions
Enterprise performance engineering solutionsEnterprise performance engineering solutions
Enterprise performance engineering solutions
 
Keynote: Elastic Observability evolution and vision
  Keynote: Elastic Observability evolution and vision  Keynote: Elastic Observability evolution and vision
Keynote: Elastic Observability evolution and vision
 
System requirements engineering
System requirements engineeringSystem requirements engineering
System requirements engineering
 
What is Platform Observability? An Overview
What is Platform Observability? An OverviewWhat is Platform Observability? An Overview
What is Platform Observability? An Overview
 
Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...Run-time Monitoring-based Evaluation and Communication Integrity Validation o...
Run-time Monitoring-based Evaluation and Communication Integrity Validation o...
 
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
 
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
 
[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1
 
Chapter 3 - Analytical Techniques
Chapter 3 - Analytical TechniquesChapter 3 - Analytical Techniques
Chapter 3 - Analytical Techniques
 
Enterprise Software Architecture styles
Enterprise Software Architecture stylesEnterprise Software Architecture styles
Enterprise Software Architecture styles
 
Analysis and Control of Computing Systems
Analysis and Control of Computing SystemsAnalysis and Control of Computing Systems
Analysis and Control of Computing Systems
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
81-T48
81-T4881-T48
81-T48
 
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...
Enhanced Feature Analysis Framework for Comparative Analysis & Evaluation of ...
 
Unit 2
Unit 2Unit 2
Unit 2
 

Recently uploaded

cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 

Recently uploaded (20)

cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 

On Adequate Behavior-based Architecture Conformance Checks

  • 1. On Adequate Behavior-based Architecture Conformance Checks Ana Nicolaescu Horst Lichter RWTH Aachen University Veit Hoffmann Generali Deutschland Informatik Services
  • 2. What is a Software Architecture (Description) “fundamental concepts or properties of a system in its environment embodied in its elements, relationships, and in the principles of its design and evolution” (ISO/IEC/IEEE 42010) 2 Logical/Static View Development View Physical ViewProcess/Behavior View Scenarios Kruchten’s 4+1
  • 3. Conformance Checking? 3 conformance checking = a process conducted to reveal the drift emerged between the intended and the implemented architecture of a system
  • 5. Static vs. Behavior View 5 Relation Behavior View Static View Method Invocation / Instantiation Yes Yes Extends / Implements / Import / Variable Access No Yes Multi-process / Heterogenuos Subsystems Yes No Remoting (REST, Queue, ...) / Dynamic Usage (Reflection, DI, ...) Yes No Execution Frequency / Time / Order Yes No
  • 6. Behavior-based Conformance Checks 6 ● “It is a challenge for dynamic compliance checking to select the right system execution scenario“ (Knodel et et al., 2008) ● “A challenge faced by any dynamic program monitoring tool is ensuring sufficient execution coverage” (De Silva and Balasubramaniam, 2013) ● The extracted architectural facts are as good as the code coverage (Ganesan et al., 2008)
  • 7. Adequacy of Behavior-based Conformance Checks 7 ● Behavior-relevant rules applied on…. ● Architecturally-relevant behavior
  • 8. Static vs. Behavior-based Conformance Checking 8 3 1217 ARAMIS Sonargraph Architect 4 are in the scope of ARAMIS ARAMIS vs. Sonargraph - number of violation types file-systems violations performance issues use of external dependencies
  • 9. ARAMIS 9 ● ARchitectural Analysis and Monitoring InfraStructure ● Behavior-based architecture conformance checking ● Monitor & analyze communication ● Detect violations against specified architecture rules ARAMIS
  • 11. Communication Rules in ARAMIS - Example 11 ValidatingMappingAdapting Extracting Implemented Architecture Description Communication Violations ARAMIS Workflow Communication Rules Intended Architecture Description
  • 12. Communication Rules in ARAMIS - Example 12 ValidatingMappingAdapting Extracting Implemented Architecture Description Communication Violations ARAMIS Workflow Communication Rules Intended Architecture Description
  • 13. Conformance Checking of ARAMIS 13 MappingAdapting ValidatingMapping
  • 14. Conformance Checking of ARAMIS 14 Nb. of Rules 19 Nb. of Violation Types 2 Statement Coverage 51% Relevant Scenarios Context VarietyScenario Coverage 75%
  • 15. Adequacy of Behavior-based Conformance Checks 15 ● Behavior-relevant rules applied on…. ● Architecturally-relevant behavior
  • 18. Second Evaluation 18 Scenario Coverage 88% Statement Coverage 34%