Symbolic Protocol Verification with Queue BDDs

被引:0
|
作者
Patrice Godefroid
David E. Long
机构
[1] Lucent Technologies,Bell Laboratories
[2] Lucent Technologies,Bell Laboratories
来源
关键词
communication protocols; queues; symbolic verification; BDDs; state explosion; state-space exploration; model checking;
D O I
暂无
中图分类号
学科分类号
摘要
Symbolic verification based on Binary Decision Diagrams (BDDs) has proven to be a powerful technique for ensuring the correctness of digital hardware. In contrast, BDDs have not caught on as widely for software verification, partly because the data types used in software are more complicated than those used in hardware. In this work, we propose an extension of BDDs for dealing with dynamic data structures. Specifically, we focus on queues, since they are commonly used in modeling communication protocols. We introduce Queue BDDs (QBDDs), which include all the power of BDDs while also providing an efficient representation of queue contents. Experimental results show that QBDDs are well-suited for the verification of communication protocols.
引用
收藏
页码:257 / 271
页数:14
相关论文
共 50 条
  • [1] Symbolic protocol verification with queue BDDs
    Godefroid, P
    Long, DE
    [J]. 11TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 1996, : 198 - 206
  • [2] Symbolic protocol verification with queue BDDs
    Godefroid, P
    Long, DE
    [J]. FORMAL METHODS IN SYSTEM DESIGN, 1999, 14 (03) : 257 - 271
  • [3] Symbolic Verification of GOLOG Programs with First-Order BDDs
    Classen, Jens
    [J]. SIXTEENTH INTERNATIONAL CONFERENCE ON PRINCIPLES OF KNOWLEDGE REPRESENTATION AND REASONING, 2018, : 524 - 528
  • [4] Symbolic path-based protocol verification
    Liu, WC
    Chung, CG
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2000, 42 (04) : 245 - 255
  • [5] Symbolic Verification of Mesh Commissioning Protocol of Thread
    Upadhyay, Pankaj
    Sharma, Subodh
    Bai, Guangdong
    [J]. PROCEEDINGS OF THE 17TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, ISEC 2024, 2024,
  • [6] Security Protocol Verification: Symbolic and Computational Models
    Blanchet, Bruno
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 3 - 29
  • [7] Symbolic Model Checking without BDDs
    Biere, A
    Cimatti, A
    Clarke, E
    Zhu, YS
    [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 1999, 1579 : 193 - 207
  • [8] Application of symbolic FSM Markovian analysis to protocol verification
    Baldi, M
    Macii, A
    Macii, E
    Poncino, R
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (05): : 221 - 226
  • [9] GENERATING BDDS FOR SYMBOLIC MODEL CHECKING IN CCS
    ENDERS, R
    FILKORN, T
    TAUBNER, D
    [J]. DISTRIBUTED COMPUTING, 1993, 6 (03) : 155 - 164
  • [10] BDDs for Representing Data in Runtime Verification
    Havelund, Klaus
    Peled, Doron
    [J]. RUNTIME VERIFICATION (RV 2020), 2020, 12399 : 107 - 128