• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 113,242
Next 10 →

Model Checking Large Network Protocol Implementations

by Madanlal Musuvathi, Dawson R. Engler - In Proceedings of the First Symposium on Networked Systems Design and Implementation , 2004
"... Network protocols must work. The e#ects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks. However, network protocols are di#cult to test due to the exponential size of the state space they define. Ideally, a pro ..."
Abstract - Cited by 86 (5 self) - Add to MetaCart
Network protocols must work. The e#ects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks. However, network protocols are di#cult to test due to the exponential size of the state space they define. Ideally, a

Abstract Model Checking Large Network Protocol Implementations

by unknown authors
"... Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks. However, network protocols are difficult to test due to the exponential size of the state space they define. Ideally, a ..."
Abstract - Add to MetaCart
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks. However, network protocols are difficult to test due to the exponential size of the state space they define. Ideally, a

Verifying Network Protocol Implementations by Symbolic Refinement Checking

by Rajeev Alur, Bow-yaw Wang - In Proc. CAV ’01, LNCS 2102 , 2001
"... . We consider the problem of establishing consistency of code implementing a network protocol with respect to the documentation as a standard RFC. The problem is formulated as a refinement checking between two models, the implementation extracted from code and the specification extracted from RF ..."
Abstract - Cited by 22 (1 self) - Add to MetaCart
. We consider the problem of establishing consistency of code implementing a network protocol with respect to the documentation as a standard RFC. The problem is formulated as a refinement checking between two models, the implementation extracted from code and the specification extracted from

Rule-Based Static Analysis of Network Protocol Implementations

by Octavian Udrea, Cristian Lumezanu, Jeffrey S. Foster - In Proceedings of the 15th USENIX Security Symposium , 2006
"... Today’s software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attacks and general robustness. However, the software that implements those protocols may still contain mistakes, and an incorrect i ..."
Abstract - Cited by 19 (2 self) - Add to MetaCart
Today’s software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attacks and general robustness. However, the software that implements those protocols may still contain mistakes, and an incorrect

Cmc: A Model Checker For Network Protocol Implementations

by Madanlal Musuvathi, David L. Dill, Mihalis Yannakakis , 2004
"... Complex systems have complex errors. Real systems have a variety of mishandled corner cases triggered by intricate sequences of events. In practice, this leaves a residue of errors that cause system crashes but only after days or weeks of continuous execution. When detected, such problems are often ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
Complex systems have complex errors. Real systems have a variety of mishandled corner cases triggered by intricate sequences of events. In practice, this leaves a residue of errors that cause system crashes but only after days or weeks of continuous execution. When detected, such problems are often very difficult to diagnose because the errors are not reproducible and the sequence of events leading to them cannot be reconstructed. Formal verification methods are a possible way to find and diagnose such deep errors...

Verifications of Network Protocol Implementations- A Review

by Saleema D, Bejoy Abraham, Perinad P. O
"... Abstract-Protocols used with different OSI layers plays an important role in quality data communication. Ambiguities in protocol specification leads to different interpretations by developers. These ambiguities should be minimized to avoid bugs and interoperability problems. There are several approa ..."
Abstract - Add to MetaCart
approaches dealing with protocol implementation testing which include a binary level verifications and code level analysis of a protocol implementations. In this article we present a formal review on verifications of protocol implementations done through static and dynamic techniques. Recent developments

CMC: A MODEL CHECKER FOR NETWORK PROTOCOL IMPLEMENTATIONS

by David L. Dill, Dawson Engler, Mihalis Yannakakis , 2004
"... ii ..."
Abstract - Add to MetaCart
Abstract not found

Verifying Network Protocol Implementations by Symbolic Refinement Checking

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

SYMBEXNET: Testing Network Protocol Implementations with Symbolic Execution and Rule-Based Specifications

by Jaeseung Song, Cristian Cadar, Peter Pietzuch
"... Abstract—Implementations of network protocols, such as DNS, DHCP and Zeroconf, are prone to flaws, security vulnerabilities and interoperability issues caused by developer mistakes and ambiguous requirements in protocol specifications. Detecting such problems is not easy because (i) many bugs manife ..."
Abstract - Add to MetaCart
Abstract—Implementations of network protocols, such as DNS, DHCP and Zeroconf, are prone to flaws, security vulnerabilities and interoperability issues caused by developer mistakes and ambiguous requirements in protocol specifications. Detecting such problems is not easy because (i) many bugs

SYMBEXNET: Testing Network Protocol Implementations with Symbolic Execution and Rule-Based Specifications

by unknown authors
"... Abstract—Implementations of network protocols, such as DNS, DHCP and Zeroconf, are prone to flaws, security vulnerabilities and interoperability issues caused by developer mistakes and ambiguous requirements in protocol specifications. Detecting such problems is not easy because (i) many bugs manife ..."
Abstract - Add to MetaCart
Abstract—Implementations of network protocols, such as DNS, DHCP and Zeroconf, are prone to flaws, security vulnerabilities and interoperability issues caused by developer mistakes and ambiguous requirements in protocol specifications. Detecting such problems is not easy because (i) many bugs
Next 10 →
Results 1 - 10 of 113,242
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University