A survey on network verification and testing with formal methods: Approaches and challenges
Networks have grown increasingly complicated. Violations of intended policies can
compromise network availability and network reliability. Network operators need to ensure …
compromise network availability and network reliability. Network operators need to ensure …
NuSMV: a new symbolic model checker
This paper describes a new symbolic model checker, called NuSMV, developed as part of a
joint project between CMU and IRST. NuSMV is the result of the reengineering …
joint project between CMU and IRST. NuSMV is the result of the reengineering …
Applying formal methods to networking: theory, techniques, and applications
Despite its great importance, modern network infrastructure is remarkable for the lack of rigor
in its engineering. The Internet, which began as a research experiment, was never designed …
in its engineering. The Internet, which began as a research experiment, was never designed …
Formal verification in hardware design: a survey
C Kern, MR Greenstreet - ACM Transactions on Design Automation of …, 1999 - dl.acm.org
In recent years, formal methods have emerged as an alternative approach to ensuring the
quality and correctness of hardware designs, overcoming some of the limitations of …
quality and correctness of hardware designs, overcoming some of the limitations of …
Efficient on-the-fly model-checking for regular alternation-free mu-calculus
R Mateescu, M Sighireanu - Science of Computer Programming, 2003 - Elsevier
Model-checking is a successful technique for automatically verifying concurrent finite-state
systems. When designing a model-checker, a good compromise must be made between the …
systems. When designing a model-checker, a good compromise must be made between the …
Efficient model checking using tabled resolution
We demonstrate the feasibility of using the XSB tabled logic programming system as a
programmable fixed-point engine for implementing efficient local model checkers. In …
programmable fixed-point engine for implementing efficient local model checkers. In …
Model-based analysis of configuration vulnerabilities
Model-based analysis of configuration vulnerabilities1 Page 1 Journal of Computer Security
10 (2002) 189–209 189 IOS Press Model-based analysis of configuration vulnerabilities1 CR …
10 (2002) 189–209 189 IOS Press Model-based analysis of configuration vulnerabilities1 CR …
Modeling self-adaptive software systems with learning Petri nets
Traditional models have limitation to model adaptive software systems since they build only
for fixed requirements, and cannot model the behaviors that change at run-time in response …
for fixed requirements, and cannot model the behaviors that change at run-time in response …
Cosa: Integrated verification for agile hardware design
Symbolic model-checking is a well-established technique used in hardware design to
assess, and formally verify, functional correctness. However, most modern model-checkers …
assess, and formally verify, functional correctness. However, most modern model-checkers …
A heuristic solution for model checking graph transformation systems
One of the commonly used techniques to verify software and hardware systems which have
been specified through graph transformation system (GTS), especially safety critical ones, is …
been specified through graph transformation system (GTS), especially safety critical ones, is …