Protocol Tracing
نویسنده
چکیده
Tools for performing automated analyses of data communication protocols are frequently based on symbolic execution algorithms that search the behavior of finite state machine models. The symbolic execution algorithms, however, are inherently restricted in the size of the models that they can handle. They work well for models that generate up to 100,000 system states. Beyond that the time and space complexity problems prevent effective analyses. A simple model, that would lend itself to faster symbolic execution, is often too restrictive for adequate modeling of real life problems. Extending the model to include, for instance, variables and value passing expands the state space to be searched by orders of magnitude, far beyond the scope of an unmodified symbolic execution algorithm. We will discuss an experimental protocol tracer that specifically aims to battle the complexity of larger protocols. Computer Networks and Simulation, Vol III, North Holland Publ. Co. 1986
منابع مشابه
A PDA Implementation of an Off-line e-Cash Protocol
We present an efficient implementation of a fair e-cash protocol especially designed for mobile wireless environments. Our protocol attempts to offer a reasonable balance between the anonymity feature on one side, and the possibility of revoking that anonymity in case that there exist reasonable doubts about the behavior of a given user. Our system considers two protocols especially designed fo...
متن کاملA comprehensive protocol for manual segmentation of the medial temporal lobe structures.
The present paper describes a comprehensive protocol for manual tracing of the set of brain regions comprising the medial temporal lobe (MTL): amygdala, hippocampus, and the associated parahippocampal regions (perirhinal, entorhinal, and parahippocampal proper). Unlike most other tracing protocols available, typically focusing on certain MTL areas (e.g., amygdala and/or hippocampus), the integr...
متن کاملThe Development of a Short-Term Liquidity Decision Model via Protocol Analysis and Probabilistic Neural Networks
A scheme for building a decision model of short-term liquidity analysis from domain experts is presented, which combines the features of both process tracing approach and output analysis approach. The scheme consists of process tracing, output analysis, and model review component. The process tracing component applies the Concurrent Verbal Protocol Analysis to build an initial decision model by...
متن کاملFair tracing based on VSS and blind signature without Trustees
We propose a tracing scheme of e-cash which has not only fair tracing ability but also lower computational complexity for comparisons. Many other protocols allow optimistic fair tracing which means that illegal tracing can be found after tracing and depositing in bank. But in this scheme, illegal tracing done by bank alone is impossible. We propose a marking mechanism based on a variant of an O...
متن کاملTracing E-mail Headers
This paper will discuss tracing e-mail headers and issues associated with it. It will address both HTTP & SMTP initiated e-mails. It will discuss different ways used by e-mail senders to evade tracing and workarounds used by investigators to combat them. It will also discuss advanced measures and techniques used by investigators to track emails. The paper will not however discuss any particular...
متن کاملTracing Eye Movement Protocols with Cognitive Process Models
In using eye movements to develop cognitive models, researchers typically analyze eye movement protocols with aggregate measures and test models with respect to these measures. Because aggregate analyses sometimes conceal informative low-level behavior, protocol analyses comparing model predictions to individual trial protocols are frequently desirable; however, protocol analysis for eye moveme...
متن کامل