Proceedings ArticleDOI
Survey of protocol verification techniques based on finite state machine models
M.C. Yuang
- pp 164-172
Reads0
Chats0
TLDR
A survey is presented of techniques for verifying correctness properties of communications protocol design based on finite-state-machine (FSM) models, and one technique is proposed as the basis for further work on a protocol verifier and analyzer workstation which is being designed as a protocol development tool.Abstract:
A survey is presented of techniques for verifying correctness properties of communications protocol design based on finite-state-machine (FSM) models. The conventional reachability analysis is first described, giving advantages and limitations. One major limitation is the so-called state-space explosion problem. To approach this and other problems, a survey of different approaches is presented. The author classifies the various techniques into categories. These include closed covers, localized protocol verification, divide-and-conquer, modified reachability analysis, and partial state exploration. Each technique is described in detail, including an analysis of its strengths and weaknesses. Based on this analysis, one technique is proposed as the basis for further work on a protocol verifier and analyzer workstation which is being designed as a protocol development tool. >read more
Citations
More filters
Journal ArticleDOI
Verification techniques for cache coherence protocols
Fong Pong,Michel Dubois +1 more
TL;DR: This article presents a comprehensive survey of various approaches for the verification of cache coherence protocols based on state enumeration, (symbolic model checking, and symbolic state models), and discusses the efficiency and the limitations of each technique in terms of memory and computation time.
Journal ArticleDOI
Synthesis of communication protocols: survey and assessment
R.L. Probert,Kassem Saleh +1 more
TL;DR: Eleven methods for the synthesis of communication protocols are described and it is noted that interactive methods allow flexibility in the design process; as a result, communication patterns are not prespecified but may be constructed interactively.
Patent
Updating and maintaining data in a multi-system network using asynchronous message transfer
TL;DR: In this article, a technique for updating a local cache database of an application system in a multi-system environment having a central system that maintains central data objects that are shared by the multiple systems is presented.
Journal ArticleDOI
Applying Formal Methods to Networking: Theory, Techniques, and Applications
Junaid Qadir,Osman Hasan +1 more
TL;DR: This paper presents a self-contained tutorial of the formidable amount of work that has been done in formal methods and presents a survey of its applications to networking.
Journal ArticleDOI
Research: Protocol validation by simultaneous reachability analysis
Kadir Ozdemir,Hasan Ural +1 more
TL;DR: In this study, 300 protocols, constructed by an automatic protocol synthesizer, are used and results are evaluated with respect to the characteristics of these protocols.
References
More filters
Journal ArticleDOI
Towards Analyzing and Synthesizing Protocols
TL;DR: In this article, the authors present techniques for both the detection of errors in protocols and for prevention of error in their design, including state deadlocks, unspecified receptions, nonexecutable interactions and state smbiguities.
Journal ArticleDOI
Protocol Verification via Projections
Simon S. Lam,A. Udaya Shankar +1 more
TL;DR: The method of projections is a new approach to reduce the complexity of analyzing nontrivial communication protocols by showing how to construct image protocols for each function.
Journal ArticleDOI
Formal Methods in Communication Protocol Design
Gregor von Bochmann,C. Sunshine +1 more
TL;DR: This paper surveys the formal methods being applied to the problems of protocol specification, verification, and implementation, including state transition models, program verification, symbolic execution, and design rules.
Journal ArticleDOI
General technique for communications protocol validation
TL;DR: The validation exhaustively exercises the interaction domain of a system and identifies all occurrences of a number of well-defined error conditions that can detect when individual processes have no predefined response to incoming messages.
Proceedings ArticleDOI
Protocol verification using reachability analysis: the state space explosion problem and relief strategies
TL;DR: The paper is to serve two purposes: first, to give a survey and evaluation of existing relief strategies and propose a new strategy, called PROVAT (PROtocol VAlidation Testing), which is inspired by the heuristic search techniques in Artificial Intelligence.
Related Papers (5)
Mechanical verification and automatic implementation of communication protocols
T. P. Blumer,D. P. Sidhu +1 more