• Corpus ID: 9797225

Survey of Protocol Defin Verification Techniques ition and

  title={Survey of Protocol Defin Verification Techniques ition and},
  author={Carl A. Sunshine},
Techniques for definition and verification of computer network protocols have progressed significantly in the past two years to the point where complex real world protocols such as HDLC, X.25, and Cyclades TS can now be analyzed. This success is largely due to the combination of two apparently divergent approachesstate transitions, and assertion proofsand to the greater automation of the verification process. This paper summarizes and compares some of the more recent work in this field… 

Tables from this paper



Verification of Protocols Using Symbolic Execution

A Unified Method for the Specification and Verification of Protocols

A unified model for protocols (and generally cooperating distant subsystems) encompassing both aspects is suggested, which is demonstrated on three different descriptions of the same protocol, with a different tradeoff between state machine and programming aspects.

Verification and Evaluation of Communication Protocols

Modelling and Verification of End-to-End Transport Protocols

Finite State Description of Communication Protocols

Automated Protocol Validation: One Chain of Development

Constructing verified and reliable communications processing systems

The methodology has been successfully applied to the experimental design of a secure message switching system structured as a packet-switched computer network.

On the modelling, analysis and design of protocols - a special class of software structures

In this paper, some of the formal models and techniques that can be applied on the modelling, analysis and design of communication protocols are reviewed.

An Axiomatic Description of the Transport Protocol of Cyclades

A problem of representation arises at each of the major development phases of a protocol: definition and testing of the definition, implementation and testing of the implementation,

Graph Modeling of computer communications protocols