Verifying network protocol implementations by symbolic refinement checking

被引:0
|
作者
Alur, R [1 ]
Wang, BY [1 ]
机构
[1] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problem of establishing consistency of code implementing a network protocol with respect to the documentation as a standard RFC. The problem is formulated as a refinement checking between two models, the implementation extracted from code and the specification extracted from RFC. After simplifications based on assume-guarantee reasoning, and automatic construction of witness modules to deal with the hidden specification state, the refinement checking problem reduces to checking transition invariants. The methodology is illustrated on two case-studies involving popular network protocols, namely, PPP (point-to-point protocol for establishing connections remotely) and DHCP (dynamic-host-configuration-protocol for configuration management in mobile networks). We also present a symbolic implementation of a reduction scheme based on compressing internal transitions in a hierarchical manner, and demonstrate the resulting savings for refinement checking in terms of memory size.
引用
收藏
页码:169 / 181
页数:13
相关论文
共 50 条
  • [1] Model checking large network protocol implementations
    Musuvathi, M
    Engler, DR
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FIRST SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI'04), 2004, : 155 - 168
  • [2] Verifying Implementations of Security Protocols by Refinement
    Polikarpova, Nadia
    Moskal, Michal
    [J]. VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
  • [3] VERIFYING OF A NETWORK CRYPTOGRAPHIC PROTOCOL USING THE MODEL CHECKING TOOLS
    Jomeiri, Alireza
    [J]. 4TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2012), 2012, : 541 - 546
  • [4] Verifying Linearizability via Optimized Refinement Checking
    Liu, Yang
    Chen, Wei
    Liu, Yanhong A.
    Sun, Jun
    Zhang, Shao Jie
    Dong, Jin Song
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2013, 39 (07) : 1018 - 1039
  • [5] Rule-based Verification of Network Protocol Implementations using Symbolic Execution
    Song, JaeSeung
    Ma, Tiejun
    Cadar, Cristian
    Pietzuch, Peter
    [J]. 2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [6] Specification-Based Symbolic Execution for Stateful Network Protocol Implementations in IoT
    Tempel, Soeren
    Herdt, Vladimir
    Drechsler, Rolf
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (11) : 9544 - 9555
  • [7] Applying Symbolic Execution to Test Implementations of a Network Protocol Against its Specification
    Asadian, Hooman
    Fiterau-Brostean, Paul
    Jonsson, Bengt
    Sagonas, Konstantinos
    [J]. 2022 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2022), 2022, : 70 - 81
  • [8] ASPIER: An Automated Framework for Verifying Security Protocol Implementations
    Chaki, Sagar
    Datta, Anupam
    [J]. PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 172 - 185
  • [9] A symbolic model checking approach to verifying satellite onboard software
    Gan, Xiang
    Dubrovin, Jori
    Heljanko, Keijo
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2014, 82 : 44 - 55
  • [10] A Symbolic Model Checking Appproach to Verifying Transact-SQL
    Diana, Rodrigo
    Marques-Neto, Humberto
    Zarate, Luis
    Song, Mark
    [J]. PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1735 - 1741