Verification of protocol conformance test cases using reachability analysis

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protocol Verification by Leaping Reachability Analysis

he communicating finite state machine (CFSM) model is one of the most widely used models for specifying and verifying communications protocols. In this model, a protocol is specified as a network of two or more processes exchanging messages over error-free simplex channels, where each process is a finite state machine (FSM) and each simplex channel is a FIFO queue. Protocol verification is ofte...

متن کامل

Verification of Protocol Conformance and Agent Interoperability

In open multi-agent systems agent interaction is usually ruled by public protocols defining the rules the agents should respect in message exchanging. The respect of such rules guarantees interoperability. Given two agents that agree on using a certain protocol for their interaction, a crucial issue (known as “a priori conformance test”) is verifying if their interaction policies, i.e. the prog...

متن کامل

Re-verification of a Lip Synchronization Protocol using Robust Reachability

The timed automata formalism is an important model for specifying and analysing real-time systems. Robustness is the correctness of the model in the presence of small drifts on clocks or imprecision in testing guards. A symbolic algorithm for the analysis of the robustness of timed automata has been implemented. In this paper, we re-analyse an industrial case lip synchronization protocol using ...

متن کامل

Run-Time Protocol Conformance Verification In Firewalls

Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and denial of service attacks. Historically, many of such attacks used illformed data-packets and/or protocol runs, which did not conform to the protocols’ standards. Attackers exploited vulnerabilities of the protocols’ i...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Systems and Software

سال: 1992

ISSN: 0164-1212

DOI: 10.1016/0164-1212(92)90018-f