Performance Improvements of Behavior Protocol Checking

نویسنده

  • J. Kofroň
چکیده

One of the serious problems of model checking is the state explosion problem. It hinders the use of model checking methods as everyday debugging tool. Using behavior protocol as a component specification mechanism also yields this problem. As the component compatibility verification using behavior protocols is based on exhaustive state space traversing, the enormous size of the state space in some cases causes not only very long time required to perform the verification (in the order of hours or days), but also consumes a substantial amount of memory. Therefore, suitable methods for both state space representation and its traversing are required. In this paper, we propose new state identification technique based on bitfields that has significantly decreased both time and memory requirements of behavior protocol checking.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

The effect of implementing the new protocol of professional ethics of residents on the implementation of hospital protocols and the behavior of residents

Abstract The effect of implementing the changed code of ethics and professional character on the implementation of hospital protocols and the behavior of medical assistants Background and Aim Professional behavior of residents plays an important role in improving hospital performance and patient satisfaction. In this study, we investigated the rate of changes in residents' adherence to pro...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Toward Unbounded Model Checking for Region Automata

The large number of program variables in a software verification model often makes model checkers ineffective. Since the performance of BDD’s is very sensitive to the number of variables, BDD-based model checking is deficient in this regard. SAT-based model checking shows some promise because the performance of SAT-solvers is less dependent on the number of variables. As a result, SAT-based tec...

متن کامل

Traceability improvements of a new RFID protocol based on EPC C1 G2

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005