Design, implementation and formal verification of BGP proxy for mimic router

被引:0
|
作者
Zhang, Jin [1 ]
Ge, Qiang [1 ,2 ]
Xu, Weihai [1 ,2 ]
Jiang, Yiming [3 ]
Ma, Hailong [3 ]
Yu, Hongtao [3 ]
机构
[1] The Endogenous Security Research Centre, Purple Mountain Laboratories, Nanjing,211100, China
[2] School of Cyber Science and Engineering, Southeast University, Nanjing,211100, China
[3] Institute of Information Technology, Information Engineering University, Zhengzhou,450000, China
来源
关键词
Border Gateway Protocol - Formal specification - Gateways (computer networks) - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:33 / 44
相关论文
共 50 条
  • [1] Formal Design, Implementation and Verification of Blockchain Languages
    Rosu, Grigore
    [J]. PROCEEDINGS OF THE 2018 18TH CONFERENCE ON FORMAL METHODS IN COMPUTER AIDED DESIGN (FMCAD), 2018, : 5 - 5
  • [2] Towards Formal Verification of a Commercial Wireless Router Firmware
    Lu, Zheng
    Steinmuller, Christopher
    Mukhopadhyay, Supratik
    [J]. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 639 - 647
  • [3] Concrete impact of formal verification on quality in IP design and implementation
    Rossi, U
    Fedeli, A
    Boschini, M
    Toto, F
    [J]. INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, PROCEEDINGS, 2001, : 38 - 43
  • [4] The design and implementation of a Cartesian router
    Farajmandi, M
    Hughes, L
    [J]. Proceedings of the 3rd Annual Communication Networks and Services Research Conference, 2005, : 84 - 90
  • [5] Design and implementation of a distributed router
    Hagsand, O
    Hidell, M
    Sjödin, P
    [J]. 2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2, 2005, : 227 - 232
  • [6] THE CHAOS ROUTER CHIP - DESIGN AND IMPLEMENTATION OF AN ADAPTIVE ROUTER
    BOLDING, K
    CHEUNG, SC
    CHOI, SE
    EBELING, C
    HASSOUN, S
    NGO, TA
    WILLE, R
    [J]. VLSI 93, 1994, 42 : 311 - 320
  • [7] Design and implementation of BGP for heterogeneous networks
    Shao, Hua
    Zhang, Tao
    Zhang, Jun
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2010, 31 (SUPPL. 2): : 270 - 274
  • [8] Formal Verification of a Timing Enforcer Implementation
    Chaki, Sagar
    de Niz, Dionisio
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16
  • [9] Towards the Formal Verification of Security Properties of a Network-on-Chip Router
    Sepulveda, Johanna
    Aboul-Hassan, Damian
    Sigl, Georg
    Becker, Bernd
    Sauer, Matthias
    [J]. 2018 23RD IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2018,
  • [10] Formal design, verification and implementation of robotic controller software via RoboChart and RoboTool
    Li, Wei
    Ribeiro, Pedro
    Miyazawa, Alvaro
    Redpath, Richard
    Cavalcanti, Ana
    Alden, Kieran
    Woodcock, Jim
    Timmis, Jon
    [J]. AUTONOMOUS ROBOTS, 2024, 48 (06)