Performance Improvements of Behavior Protocol Checking
نویسنده
چکیده
One of the serious problems of model checking is the state explosion problem. It hinders the use of model checking methods as everyday debugging tool. Using behavior protocol as a component specification mechanism also yields this problem. As the component compatibility verification using behavior protocols is based on exhaustive state space traversing, the enormous size of the state space in some cases causes not only very long time required to perform the verification (in the order of hours or days), but also consumes a substantial amount of memory. Therefore, suitable methods for both state space representation and its traversing are required. In this paper, we propose new state identification technique based on bitfields that has significantly decreased both time and memory requirements of behavior protocol checking.
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملThe effect of implementing the new protocol of professional ethics of residents on the implementation of hospital protocols and the behavior of residents
Abstract The effect of implementing the changed code of ethics and professional character on the implementation of hospital protocols and the behavior of medical assistants Background and Aim Professional behavior of residents plays an important role in improving hospital performance and patient satisfaction. In this study, we investigated the rate of changes in residents' adherence to pro...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملToward Unbounded Model Checking for Region Automata
The large number of program variables in a software verification model often makes model checkers ineffective. Since the performance of BDD’s is very sensitive to the number of variables, BDD-based model checking is deficient in this regard. SAT-based model checking shows some promise because the performance of SAT-solvers is less dependent on the number of variables. As a result, SAT-based tec...
متن کاملTraceability improvements of a new RFID protocol based on EPC C1 G2
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...
متن کامل