Verifying network protocol implementations by symbolic refinement checking

被引:0
|
作者
Alur, R [1 ]
Wang, BY [1 ]
机构
[1] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problem of establishing consistency of code implementing a network protocol with respect to the documentation as a standard RFC. The problem is formulated as a refinement checking between two models, the implementation extracted from code and the specification extracted from RFC. After simplifications based on assume-guarantee reasoning, and automatic construction of witness modules to deal with the hidden specification state, the refinement checking problem reduces to checking transition invariants. The methodology is illustrated on two case-studies involving popular network protocols, namely, PPP (point-to-point protocol for establishing connections remotely) and DHCP (dynamic-host-configuration-protocol for configuration management in mobile networks). We also present a symbolic implementation of a reduction scheme based on compressing internal transitions in a hierarchical manner, and demonstrate the resulting savings for refinement checking in terms of memory size.
引用
下载
收藏
页码:169 / 181
页数:13
相关论文
共 50 条
  • [31] Verifying Reference Counting Implementations
    Emmi, Michael
    Jhala, Ranjit
    Kohler, Eddie
    Majumdar, Rupak
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2009, 5505 : 352 - +
  • [32] Abstraction refinement in symbolic model checking using satisfiability as the only decision procedure
    Li B.
    Wang C.
    Somenzi F.
    International Journal on Software Tools for Technology Transfer, 2005, 7 (2) : 143 - 155
  • [33] A Model Checking Method for Verifying the Fault Tolerance of Distributed Protocol Liveness Properties
    Lu C.-Y.
    Nie C.-H.
    Cheung S.C.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (08): : 1714 - 1731
  • [34] Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
    Aizatulin, Mihhail
    Gordon, Andrew D.
    Juerjens, Jan
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 331 - 340
  • [35] Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking
    Zhang, Jingjing
    Yang, Lin
    Gao, Xianming
    Tang, Gaigai
    Zhang, Jiyong
    Wang, Qiang
    IEEE ACCESS, 2021, 9 : 14836 - 14848
  • [36] Refinement is complete for implementations
    Huth, M
    FORMAL ASPECTS OF COMPUTING, 2005, 17 (02) : 113 - 137
  • [37] Towards Symbolic Model-Based Mutation Testing: Combining Reachability and Refinement Checking
    Aichernig, Bernhard K.
    Joebstl, Elisabeth
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2012, (80): : 88 - 102
  • [38] Verifying pCTL Model Checking
    Hoelzl, Johannes
    Nipkow, Tobias
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2012, 2012, 7214 : 347 - 361
  • [39] Verifying Constant-Time Implementations
    Almeida, Jose Bacelar
    Barbosa, Manuel
    Barthe, Gilles
    Dupressoir, Francois
    Emmi, Michael
    PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 53 - 70
  • [40] Specifying and Checking Network Protocol Based on TLA
    Wan, Liang
    Shi, Wenchang
    2012 INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2012,