Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1368088.1368187acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Experience applying the SPIN model checker to an industrial telecommunications system

Published: 10 May 2008 Publication History

Abstract

Model checking has for years been advertised as a way of ensuring the correctness of complex software systems. However, there exist surprisingly few critical studies of the application of model checking to industrial-scale software systems by people other than the model checker's own authors. In this paper we report our experience in applying the Spin model checker to the validation of the failover protocols of a commercial telecommunications system. While we conclude that model checking is not yet ready for such applications, we find that current research in the model checking community is working to address the difficulties we encountered.

References

[1]
T. Ball, B. Cook, V. Levin, and S. Rajamani. SLAM and Static Driver Verifier: Technology transfer of formal methods inside Microsoft. Technical Report MSR-TR-2004-08, Microsoft Research, January 2004.
[2]
B. Boigelot and P. Godefroid. Model checking in practise: An analysis of the access.bus protocol using spin. In Formal Methods Europe (FME), LNCS 1051, pages 465--478. Springer Verlag, 1996.
[3]
S. Chandra, P. Godefroid, and C. Palm. Software model checking in practice: An industrial case study. In International Conference on Software Engineering (ICSE 2002), pages 431--441, May 2002.
[4]
E. Clarke and J. Wing. Formal methods: State of the art and future directions. ACM Computing Surveys, 28(4):626--643, December 1996.
[5]
M. Dwyer, J. Hatcliff, R. Joehanes, S. Laubach, C. Pasareanu, Robby, W. Visser, and H. Zheng. Tool-supported program abstraction for finite-state verification. In 23rd International Conference on Software Engineering (ICSE'01), May 2001.
[6]
M. Dwyer, J. Hatcliff, Robby, C. Pasareanu, and W. Visser. Formal software analysis: Emerging trends in software model checking. In 28th International Conference on Software Engineering, Track on Future of Software Engineering (ICSE FoSE 2007), pages 120--136. ACM Press, 2007.
[7]
D. Engler and M. Musuvathi. Model-checking large network protocol implementations. In First Conference on Network System Design and Implementation (NSDI), 2004.
[8]
P. Godefroid. Software model checking: The Verisoft approach. Formal Methods in System Design, 26(2):77--101, 2005.
[9]
P. Godefroid. Software model checking via static and dynamic program analysis (invited tutorial). Summer School on MOdelling and VErifying parallel Processes (MOVEP'06), June 2006.
[10]
P. Godefroid, N. Klarlund, and K. Sen. Dart: Directed automated random testing. In ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pages 213--223, Chicago, June 2005.
[11]
T. Graham, R. Kazman, and C. Walmsley. Agility and experimentation: Practical techniques for resolving architectural tradeoffs. In ICSE '07, pages 519--528, 2007.
[12]
K. Havelund, M. Lowry, S. Park, C. Pecheur, J. Penix, W. Visser, and J. White. Formal analysis of the remote agent before and after flight. In 5th NASA Langley Formal Methods Workshop, June 2000.
[13]
G. Holzmann. The Spin Model Checker: Primer and Reference Manual. Addison-Wesley, 2003.
[14]
G. Holzmann and M. Smith. Automating software feature verification. Bell Labs Technical Journal, 5(2):72--87, 2002. Special Issue: Software.
[15]
G. Hughesa, S. Rajana, and T. Sidlea. Error detection in concurrent Java programs. In Workshop on Software Model Checking (SoftMC 2005), Electronic Notes in Theoretical Computer Science, pages 45--58, February 2006.
[16]
J. Ivers. Lessons learned model checking an industrial communication library. Technical Report CMU/SEI-2005-TN-039, Carnegie Mellon University, 2005.
[17]
M. Musuvathi, D. Park, A. Chou, D. Engler, and D. Dill. CMC: A pragmatic approach to model checking real code. In Symposium on Operating Systems Design and Implementation (OSDI, 2002.
[18]
C. Pacheco, S. Lahiri, M. Ernst, and T. Ball. Feedback-directed random test generation. In 29th International Conference on Software Engineering (ICSE), Minneapolis, May 2007.
[19]
J. Penix, W. Visser, S. Park, C. Pasareanu, E. Engstrom, A. Larson, and N. Weininger. Verifying time partitioning in the deos scheduling kernel. Formal Methods in System Design, 26(2):103--135, 2005.
[20]
W. Visser, K. Havelund, G. Brat, S. Park, and F. Lerda. Model checking programs. Automated Software Engineering Journal, 10(2), April 2003.
[21]
J. Wing and M. Vaziri-Farahani. A case study in model checking software systems. Science of Computer Programming, 28:273--299, 1997.
[22]
C. Zannier, G. Melnik, and F. Maurer. On the success of empirical studies in the International Conference on Software Engineering. In 28th International Conference on Software Engineering (ICSE 2006), pages 341--350. ACM Press, May 2006.

Cited By

View all
  • (2018)Automatic security verification of mobile app configurationsFuture Generation Computer Systems10.1016/j.future.2016.06.01480:C(519-536)Online publication date: 1-Mar-2018
  • (2018)The role of model checking in software engineeringFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-6192-012:4(642-668)Online publication date: 1-Aug-2018
  • (2014)Enabling BYOD through secure meta-marketProceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks10.1145/2627393.2627410(219-230)Online publication date: 23-Jul-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICSE '08: Proceedings of the 30th international conference on Software engineering
May 2008
558 pages
ISBN:9781605580791
DOI:10.1145/1368088
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 May 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. experience report
  2. formal methods
  3. model checking

Qualifiers

  • Research-article

Conference

ICSE '08
Sponsor:

Acceptance Rates

ICSE '08 Paper Acceptance Rate 56 of 370 submissions, 15%;
Overall Acceptance Rate 276 of 1,856 submissions, 15%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Automatic security verification of mobile app configurationsFuture Generation Computer Systems10.1016/j.future.2016.06.01480:C(519-536)Online publication date: 1-Mar-2018
  • (2018)The role of model checking in software engineeringFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-6192-012:4(642-668)Online publication date: 1-Aug-2018
  • (2014)Enabling BYOD through secure meta-marketProceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks10.1145/2627393.2627410(219-230)Online publication date: 23-Jul-2014
  • (2014)Robust synthesis for real-time systemsTheoretical Computer Science10.1016/j.tcs.2013.08.015515(96-122)Online publication date: 1-Jan-2014
  • (2012)DiscoTechProceedings of the ACM 2012 conference on Computer Supported Cooperative Work10.1145/2145204.2145397(1287-1296)Online publication date: 11-Feb-2012
  • (2011)Autonomous vehicle control systems — a review of decision makingProceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering10.1177/2041304110394727225:2(155-195)Online publication date: 1-Mar-2011
  • (2011)A three-level verification approach on Wireless Communication Controller SystemProceedings of 2011 International Conference on Computer Science and Network Technology10.1109/ICCSNT.2011.6182498(2591-2596)Online publication date: Dec-2011
  • (2011)A general collaborative editing platform based on file locking mechanism2011 IEEE International Conference on Computer Science and Automation Engineering10.1109/CSAE.2011.5952503(436-440)Online publication date: Jun-2011
  • (2010)Gone but not forgottenProceedings of the 2010 ACM conference on Computer supported cooperative work10.1145/1718918.1718951(179-188)Online publication date: 6-Feb-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media