Trace Analysis for Conformance and Arbitration Testing
IEEE Transactions on Software Engineering
Specification-based test oracles for reactive systems
ICSE '92 Proceedings of the 14th international conference on Software engineering
Oracles for checking temporal properties of concurrent systems
SIGSOFT '94 Proceedings of the 2nd ACM SIGSOFT symposium on Foundations of software engineering
An automatic trace analysis tool generator for Estelle specifications
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Specification-based testing of reactive software: tools and experiments: experience report
ICSE '97 Proceedings of the 19th international conference on Software engineering
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Formal verification of standards for distance vector routing protocols
Journal of the ACM (JACM)
SCR*: A Toolset for Specifying and Analyzing Software Requirements
CAV '98 Proceedings of the 10th International Conference on Computer Aided Verification
Simulation-based `STRESS' Testing Case Study: A Multicast Routing Protocol
MASCOTS '98 Proceedings of the 6th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
A Flexible, Extensible Simulation Environment for Testing Real-Time Specifications
RTAS '97 Proceedings of the 3rd IEEE Real-Time Technology and Applications Symposium (RTAS '97)
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
A model of specification-based test oracles
A model of specification-based test oracles
Foundations for the run-time analysis of software systems
Foundations for the run-time analysis of software systems
Formal verification of standards for distance vector routing protocols
Journal of the ACM (JACM)
From symptom to cause: localizing errors in counterexample traces
POPL '03 Proceedings of the 30th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Modeling and simulation of routing protocol for mobile ad hoc networks using colored petri nets
CRPIT '02 Proceedings of the conference on Application and theory of petri nets: formal methods in software engineering and defence systems - Volume 12
Java-MaC: A Run-Time Assurance Approach for Java Programs
Formal Methods in System Design
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
Formal prototyping in early stages of protocol design
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Formal Methods in System Design
Formal Verification of Simulation Traces Using Computation Slicing
IEEE Transactions on Computers
A formal validation methodology for MANET routing protocols based on nodes' self similarity
Computer Communications
Interoperability testing of a MANET routing protocol using a node self-similarity approach
Proceedings of the 2008 ACM symposium on Applied computing
A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS
Cybernetics and Systems
An Object-Oriented Component Model for Heterogeneous Nets
Formal Methods for Components and Objects
A passive conformance testing approach for a MANET routing protocol
Proceedings of the 2009 ACM symposium on Applied Computing
Model checking active networks with SPIN
Computer Communications
Analysis of Wireless Sensor Network Protocols in Dynamic Scenarios
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Integration of Reliability and Performance Analyses for Active Network Services
Electronic Notes in Theoretical Computer Science (ENTCS)
Formal modeling and verification of high-availability protocol for network security appliances
ATVA'07 Proceedings of the 5th international conference on Automated technology for verification and analysis
ACM Computing Surveys (CSUR)
On-the-fly verification of discrete event simulations by means of simulation purposes
Proceedings of the 2011 Symposium on Theory of Modeling & Simulation: DEVS Integrative M&S Symposium
Foundations for the run-time monitoring of reactive systems: fundamentals of the MaC language
ICTAC'04 Proceedings of the First international conference on Theoretical Aspects of Computing
On the complexity of error explanation
VMCAI'05 Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation
FMOODS'05 Proceedings of the 7th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems
A specification-based intrusion detection model for OLSR
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
A rigorous analysis of AODV and its variants
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Nodes self-similarity to test wireless ad hoc routing protocols
TestCom'07/FATES'07 Proceedings of the 19th IFIP TC6/WG6.1 international conference, and 7th international conference on Testing of Software and Communicating Systems
A unified approach for static and runtime verification: framework and applications
ISoLA'12 Proceedings of the 5th international conference on Leveraging Applications of Formal Methods, Verification and Validation: technologies for mastering change - Volume Part I
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.01 |
Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces in an extended form of linear temporal logic. Our technique uses the NS simulator together with a component of the MaC system to provide a uniform framework. We demonstrate its effectiveness by analyzing simulations of the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for packet radio networks. Our analysis finds violations of significant properties and we discuss the faults that cause them. Novel aspects of our approach include modest integration costs with other simulation objectives such as performance evaluation, greatly increased flexibility in specifying properties to be checked and techniques for analyzing complex traces of alarms raised by the monitoring software.