scispace - formally typeset
Proceedings ArticleDOI

Survey of protocol verification techniques based on finite state machine models

M.C. Yuang
- pp 164-172
Reads0
Chats0
TLDR
A survey is presented of techniques for verifying correctness properties of communications protocol design based on finite-state-machine (FSM) models, and one technique is proposed as the basis for further work on a protocol verifier and analyzer workstation which is being designed as a protocol development tool.
Abstract
A survey is presented of techniques for verifying correctness properties of communications protocol design based on finite-state-machine (FSM) models. The conventional reachability analysis is first described, giving advantages and limitations. One major limitation is the so-called state-space explosion problem. To approach this and other problems, a survey of different approaches is presented. The author classifies the various techniques into categories. These include closed covers, localized protocol verification, divide-and-conquer, modified reachability analysis, and partial state exploration. Each technique is described in detail, including an analysis of its strengths and weaknesses. Based on this analysis, one technique is proposed as the basis for further work on a protocol verifier and analyzer workstation which is being designed as a protocol development tool. >

read more

Citations
More filters
Journal ArticleDOI

Verification techniques for cache coherence protocols

TL;DR: This article presents a comprehensive survey of various approaches for the verification of cache coherence protocols based on state enumeration, (symbolic model checking, and symbolic state models), and discusses the efficiency and the limitations of each technique in terms of memory and computation time.
Journal ArticleDOI

Synthesis of communication protocols: survey and assessment

TL;DR: Eleven methods for the synthesis of communication protocols are described and it is noted that interactive methods allow flexibility in the design process; as a result, communication patterns are not prespecified but may be constructed interactively.
Patent

Updating and maintaining data in a multi-system network using asynchronous message transfer

TL;DR: In this article, a technique for updating a local cache database of an application system in a multi-system environment having a central system that maintains central data objects that are shared by the multiple systems is presented.
Journal ArticleDOI

Applying Formal Methods to Networking: Theory, Techniques, and Applications

TL;DR: This paper presents a self-contained tutorial of the formidable amount of work that has been done in formal methods and presents a survey of its applications to networking.
Journal ArticleDOI

Research: Protocol validation by simultaneous reachability analysis

TL;DR: In this study, 300 protocols, constructed by an automatic protocol synthesizer, are used and results are evaluated with respect to the characteristics of these protocols.
References
More filters
Journal ArticleDOI

Towards Analyzing and Synthesizing Protocols

TL;DR: In this article, the authors present techniques for both the detection of errors in protocols and for prevention of error in their design, including state deadlocks, unspecified receptions, nonexecutable interactions and state smbiguities.
Journal ArticleDOI

Protocol Verification via Projections

TL;DR: The method of projections is a new approach to reduce the complexity of analyzing nontrivial communication protocols by showing how to construct image protocols for each function.
Journal ArticleDOI

Formal Methods in Communication Protocol Design

TL;DR: This paper surveys the formal methods being applied to the problems of protocol specification, verification, and implementation, including state transition models, program verification, symbolic execution, and design rules.
Journal ArticleDOI

General technique for communications protocol validation

TL;DR: The validation exhaustively exercises the interaction domain of a system and identifies all occurrences of a number of well-defined error conditions that can detect when individual processes have no predefined response to incoming messages.
Proceedings ArticleDOI

Protocol verification using reachability analysis: the state space explosion problem and relief strategies

TL;DR: The paper is to serve two purposes: first, to give a survey and evaluation of existing relief strategies and propose a new strategy, called PROVAT (PROtocol VAlidation Testing), which is inspired by the heuristic search techniques in Artificial Intelligence.
Related Papers (5)