A survey on network verification and testing with formal methods: Approaches and challenges

Y Li, X Yin, Z Wang, J Yao, X Shi, J Wu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Networks have grown increasingly complicated. Violations of intended policies can
compromise network availability and network reliability. Network operators need to ensure …

NuSMV: a new symbolic model checker

A Cimatti, E Clarke, F Giunchiglia, M Roveri - International journal on …, 2000 - Springer
This paper describes a new symbolic model checker, called NuSMV, developed as part of a
joint project between CMU and IRST. NuSMV is the result of the reengineering …

Applying formal methods to networking: theory, techniques, and applications

J Qadir, O Hasan - IEEE Communications Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Despite its great importance, modern network infrastructure is remarkable for the lack of rigor
in its engineering. The Internet, which began as a research experiment, was never designed …

Formal verification in hardware design: a survey

C Kern, MR Greenstreet - ACM Transactions on Design Automation of …, 1999 - dl.acm.org
In recent years, formal methods have emerged as an alternative approach to ensuring the
quality and correctness of hardware designs, overcoming some of the limitations of …

Efficient on-the-fly model-checking for regular alternation-free mu-calculus

R Mateescu, M Sighireanu - Science of Computer Programming, 2003 - Elsevier
Model-checking is a successful technique for automatically verifying concurrent finite-state
systems. When designing a model-checker, a good compromise must be made between the …

Efficient model checking using tabled resolution

YS Ramakrishna, CR Ramakrishnan… - … Aided Verification: 9th …, 1997 - Springer
We demonstrate the feasibility of using the XSB tabled logic programming system as a
programmable fixed-point engine for implementing efficient local model checkers. In …

Model-based analysis of configuration vulnerabilities

CR Ramakrishnan, R Sekar - Journal of Computer Security, 2002 - content.iospress.com
Model-based analysis of configuration vulnerabilities1 Page 1 Journal of Computer Security
10 (2002) 189–209 189 IOS Press Model-based analysis of configuration vulnerabilities1 CR …

Modeling self-adaptive software systems with learning Petri nets

Z Ding, Y Zhou, M Zhou - … of the 36th International Conference on …, 2014 - dl.acm.org
Traditional models have limitation to model adaptive software systems since they build only
for fixed requirements, and cannot model the behaviors that change at run-time in response …

Cosa: Integrated verification for agile hardware design

C Mattarei, M Mann, C Barrett, RG Daly… - … Formal Methods in …, 2018 - ieeexplore.ieee.org
Symbolic model-checking is a well-established technique used in hardware design to
assess, and formally verify, functional correctness. However, most modern model-checkers …

A heuristic solution for model checking graph transformation systems

R Yousefian, V Rafe, M Rahmani - Applied Soft Computing, 2014 - Elsevier
One of the commonly used techniques to verify software and hardware systems which have
been specified through graph transformation system (GTS), especially safety critical ones, is …