scispace - formally typeset
Journal ArticleDOI

Verisim: formal analysis of network simulations

TLDR
Novel aspects of the approach include modest integration costs with other simulation objectives such as performance evaluation, greatly increased flexibility in specifying properties to be checked and techniques for analyzing complex traces of alarms raised by the monitoring software.
Abstract
Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces in an extended form of linear temporal logic. Our technique uses the INS simulator together with a component of the MaC system to provide a uniform framework. We demonstrate its effectiveness by analyzing simulations of the ad hoc on-demand distance vector (AODV) routing protocol for packet radio networks. Our analysis finds violations of significant properties and we discuss the faults that cause them. Novel aspects of our approach include modest integration costs with other simulation objectives such as performance evaluation, greatly increased flexibility in specifying properties to be checked and techniques for analyzing complex traces of alarms raised by the monitoring software.

read more

Citations
More filters
Proceedings ArticleDOI

From symptom to cause: localizing errors in counterexample traces

TL;DR: An algorithm is presented that exploits the existence of correct traces in order to localize the error cause in an error trace, report a single error trace per error cause, and generate multiple error traces having independent causes.
Journal ArticleDOI

Java-MaC: A Run-Time Assurance Approach for Java Programs

TL;DR: Java-MaC as discussed by the authors is a prototype implementation of the Monitoring and Checking (MaC) architecture for Java programs, which is a lightweight formal method solution which works as a viable complement to the current heavyweight formal methods.
Journal ArticleDOI

Java-MaC: A Run-time Assurance Tool for Java Programs

TL;DR: The paper presents an overview of the MaC architecture and a prototype implementation of the Monitoring and Checking (MaC) architecture, a lightweight formal method solution as a viable complement to the current heavyweight formal methods.
Journal ArticleDOI

Formal verification of standards for distance vector routing protocols

TL;DR: This work shows how to use an interactive theorem prover, HOL, together with a model checker, SPIN, to prove key properties of distance vector routing protocols, and develops verification techniques suited to routing protocols generally.
Book ChapterDOI

Attack Analysis and Detection for Ad Hoc Routing Protocols

TL;DR: This paper introduces the concept of basic events, and defines a taxonomy of anomalous basic events by analyzing the basic security goals of an attack.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI

Ad-hoc on-demand distance vector routing

TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.
Proceedings ArticleDOI

A performance comparison of multi-hop wireless ad hoc network routing protocols

TL;DR: The results of a derailed packet-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocols, which cover a range of designchoices: DSDV,TORA, DSR and AODV are presented.

Defining Liveness

TL;DR: A formal definition for liveness properties is proposed, and every property is shown to be the intersection of a safety property and a liveness property.
Proceedings Article

EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances

TL;DR: The EMERALD (Event Monitoring Enabling Responses to Anomalous Live Disturbances) environment is a distributed scalable tool suite for tracking malicious activity through and across large networks.