Model Checking in Practice: An Analysis of the ACCESS.busTM Protocol using SPIN

نویسنده

  • Bernard Boigelot
چکیده

This paper presents a case study of the use of model checking for analyzing an industrial protocol, the ACCESS.bus TM protocol. Our analysis of this protocol was carried out using SPIN, an automated verii-cation system which includes an implementation of model-checking algorithms. A model of the protocol was developed, and properties expressed by linear-time temporal-logic formulas were checked on this model. This analysis revealed subtle aws in the design of the protocol. Developers who worked on implementations of ACCESS.bus TM were unaware of these aws at a very late stage of their development process. We also present suggestions for solving the detected problems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

اندازه گیری غیریکنواختی امواج رادیوئی در ام آر آی

Introduction: Non-uniformity is one of the most important parameters affecting MRI images which can lead to harmful effects in the diagnosis and analysis of qualitative and quantitative methods. The present study introduced a method for measuring RF non-homogeneity in MRI systems. Methods and Materials: To verify the uniformity of B0 and B1 fields, a cylindrical phantom with a diameter of 24 c...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Reachability checking in complex and concurrent software systems using intelligent search methods

Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...

متن کامل

Modeling and Performance Evaluation of Energy Consumption in S-MAC Protocol Using Generalized Stochastic Petri Nets

One of the features of wireless sensor networks is that the nodes in this network have limited power sources. Therefore, assessment of energy consumption in these networks is very important. What has been common practice has been the use of traditional simulators to evaluate the energy consumption of the nodes in these networks. Simulators often have problems such as fluctuating output values i...

متن کامل

A Formal Security Analysis of Secure AODV (SAODV) using Model Checking

In this paper, we present current state of our research on using model checking to analyze security properties of secure routing protocols for mobile ad hoc networks (MANETs). We provide a formal security analysis of Secure AODV (SAODV) using SPIN, a well-known model checker. First, we formally specify two security properties in the presence of an external attacker and model the protocol using ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996