Using model checking to find serious file system errors

@inproceedings{Yang2004UsingMC,
  title={Using model checking to find serious file system errors},
  author={Junfeng Yang and Paul Twohey and Dawson R. Engler and Madan Musuvathi},
  booktitle={TOCS},
  year={2004}
}
  • Junfeng Yang, Paul Twohey, +1 author Madan Musuvathi
  • Published in TOCS 2004
  • Computer Science
  • This article shows how to use model checking to find serious errors in file systems. Model checking is a formal verification technique tuned for finding corner-case errors by comprehensively exploring the state spaces defined by a system. File systems have two dynamics that make them attractive for such an approach. First, their errors are some of the most serious, since they can destroy persistent data and lead to unrecoverable corruption. Second, traditional testing needs an impractical… CONTINUE READING

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 317 CITATIONS

    EXPLODE: a lightweight, general system for finding serious storage system errors

    VIEW 10 EXCERPTS
    CITES METHODS, RESULTS & BACKGROUND

    Finding semantic bugs in file systems with an extensible fuzzing framework

    VIEW 3 EXCERPTS
    CITES BACKGROUND

    Finding Bugs in File Systems with an Extensible Fuzzing Framework

    VIEW 3 EXCERPTS
    CITES BACKGROUND

    Specifying and Checking File System Crash-Consistency Models

    VIEW 1 EXCERPT
    CITES METHODS

    Verifying compiled file system code

    VIEW 2 EXCERPTS
    CITES METHODS

    Certifying a crash-safe file system

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Ffsck: The Fast File-System Checker

    VIEW 2 EXCERPTS
    CITES METHODS & BACKGROUND

    FILTER CITATIONS BY YEAR

    2005
    2020

    CITATION STATISTICS

    • 17 Highly Influenced Citations

    • Averaged 11 Citations per year from 2018 through 2020

    References

    Publications referenced by this paper.
    SHOWING 1-2 OF 2 REFERENCES

    Model checking for programming languages using VeriSoft

    VIEW 5 EXCERPTS
    HIGHLY INFLUENTIAL

    Protocol verification as a hardware design aid

    VIEW 2 EXCERPTS
    HIGHLY INFLUENTIAL