A validation of the OSI session layer protocol
Computer Networks and ISDN Systems
Format and protocol language (FAPL)
Computer Networks and ISDN Systems - Special Issue: Protocol Specification and Testing
Program verification: the very idea
Communications of the ACM
SIGCOMM '87 Proceedings of the ACM workshop on Frontiers in computer communications technology
On Communicating Finite-State Machines
Journal of the ACM (JACM)
Modelling and Analysis of Communication and Cooperation Protocols Using Petri Net Based Models
Proceedings of the IFIP WG6.1 Second International Workshop on Protocol Specification, Testing and Verification
Computer-aided analysis of concurrent systems
Proceedings of the IFIP WG6.1 Fifth International Conference on Protocol Specification, Testing and Verification V
On Limits and Possibilities of Automated Protocol Analysis
Proceedings of the IFIP WG6.1 Seventh International Conference on Protocol Specification, Testing and Verification VII
Verification in XESAR of the Sliding Window Protocol
Proceedings of the IFIP WG6.1 Seventh International Conference on Protocol Specification, Testing and Verification VII
Proof of Specification Properties by Using Finite State Machines and Temporal Logic
Proceedings of the IFIP WG6.1 Seventh International Conference on Protocol Specification, Testing and Verification VII
Automated verification of connection management of NBS class 4 transport protocol
SIGCOMM '84 Proceedings of the ACM SIGCOMM symposium on Communications architectures and protocols: tutorials & symposium
Testing and Debugging Distributed Programs Using Global Predicates
IEEE Transactions on Software Engineering
Economics of software verification
PASTE '01 Proceedings of the 2001 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering
Web Recency Maintenance Protocol
IWDC '02 Proceedings of the 4th International Workshop on Distributed Computing, Mobile and Wireless Computing
omega-Regular Languages Are Testable with a Constant Number of Queries
RANDOM '02 Proceedings of the 6th International Workshop on Randomization and Approximation Techniques
Model Checking Communication Protocols
SOFSEM '01 Proceedings of the 28th Conference on Current Trends in Theory and Practice of Informatics Piestany: Theory and Practice of Informatics
ω-Regular languages are testable with a constant number of queries
Theoretical Computer Science
Uniform random sampling of traces in very large models
Proceedings of the 1st international workshop on Random testing
Uniform Monte-Carlo model checking
FASE'11/ETAPS'11 Proceedings of the 14th international conference on Fundamental approaches to software engineering: part of the joint European conferences on theory and practice of software
January: a parallel algorithm for bug hunting based on insect behavior
PPSN'06 Proceedings of the 9th international conference on Parallel Problem Solving from Nature
TACAS'05 Proceedings of the 11th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Hi-index | 0.00 |
Protocol validation and verification techniques have been applied successfully for a number of years to a wide range of protocols. The increasing complexity of our communications systems requires us to examine existing techniques and make a realistic assessment of which techniques will be applicable to the complex systems of the future. We believe that validation techniques based on an exhaustive reachability analysis will not be effective. Sampling techniques, such as executing a random walk through the reachable state space, are effective in complex systems, since most protocol errors occur in many different states of the system.More than 10 years have elapsed since the first automated validation techniques were first applied to communications protocols [1,2]. In the meantime, considerable advances have been made in validation technology, but more significantly, the scale and nature of the validation problem have changed. The communications systems that we need to validate today are significantly more complex than those of ten years ago. Our methods must evolve in order to address the current challenge.This paper is concerned primarily with the nature of the validation process, and the results that we might reasonably expect to achieve when validating protocols in complex communications systems.