Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2663171.2663184acmconferencesArticle/Chapter ViewAbstractPublication PagesadaConference Proceedingsconference-collections
research-article

A framework for model checking UDP network programs with Java pathfinder

Published: 18 October 2014 Publication History

Abstract

Complex asynchronous, distributed systems could benefit significantly from model checking, but model checking programs do not natively support verification of distributed software. Several frameworks have been developed recently that apply model checking to networked software, but none of these frameworks support complete modeling of programs that use the User Datagram Protocol (UDP). This paper presents the first framework to model realistic rather than ideal UDP network operations using Java Pathfinder, and describes its use in verifying a distributed UDP-based application.

References

[1]
C. Artho and P. Garoche. Accurate centralization for applying model checking on networked applications. In Automated Software Engineering, pages 177--188. IEEE, 2006.
[2]
C. Artho, Leungwattanakit, W., M. Hagiya, and Y. Tanabe. Efficient model checking of networked applications. Objects, Components, Models and Patterns, pages 22--40, 2008.
[3]
C. Artho, W. Leungwattanakit, M. Hagiya, Y. Tanabe, and M. Yamamoto. Cache-based model checking of networked applications: From linear to branching time. In Automated Software Engineering, pages 447--458. IEEE, 2009.
[4]
E. Barlas and T. Bultan. Netstub: a framework for verification of distributed java applications. In Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering, pages 24--33. ACM, 2007.
[5]
E. Clarke, O. Grumberg, and D. Peled. Model Checking. The MIT Press, 1999.
[6]
K. Haveland and T. Pressburger. Model checking java programs using java pathfinder. International Journal on Software Tools for Technology Transfer, 2(4):366--381, 2000.
[7]
M. Musuvathi and D. Engler. Model checking large network protocol implementations. In Proceedings of the First Symposium on Networked Systems Design and Implementation, pages 155--168. NSDI, March 2004.
[8]
B. Richards. Bugs as features: Teaching network protocols through debugging. In Proceedings of the thirty-first SIGCSE Technical Symposium on Computer Science Education, pages 24--33. ACM, March 2000.
[9]
B. Richards and B. Stull. Teaching wireless networks with minimal resources. In Proceedings of the thirty-fifth SIGCSE Technical Symposium on Computer Science Education, pages 306--310. ACM, March 2004.
[10]
B. Richards and N. Waisbrot. Illustrating networking concepts with wireless handheld devices. In Proceedings of the Seventh Annual Conference on Innovation and Technology in Computer Science Education, pages 28--33. ACM, June 2002.
[11]
N. Shafiei and P. Mehlitz. Extending jpf to verify distributed systems. SIGSOFT Softw. Eng. Notes, 39(1):1--5, February 2014.
[12]
N. Shafiei, E. Ruppert, and J. Ostroff. Model Checking Distributed Java Applications. Unpublished Thesis Proposal. University of York., 2013.
[13]
S. Stoller and Y. Liu. Transformations for model checking distributed java programs. In Proceedings of the 8th international SPIN workshop on Model checking of software, pages 192--199. Springer-Verlag, 2001.

Cited By

View all
  • (2021)Model-Agnostic and Efficient Exploration of Numerical Congestion Control State Space of Real-World TCP ImplementationsIEEE/ACM Transactions on Networking10.1109/TNET.2021.307816129:5(1990-2004)Online publication date: Oct-2021
  • (2019)Model-agnostic and efficient exploration of numerical state space of real-world TCP congestion control implementationsProceedings of the 16th USENIX Conference on Networked Systems Design and Implementation10.5555/3323234.3323292(719-733)Online publication date: 26-Feb-2019
  • (2017)Improving the cost-effectiveness of symbolic testing techniques for transport protocol implementations under packet dynamicsProceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3092703.3092706(79-89)Online publication date: 10-Jul-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HILT '14: Proceedings of the 2014 ACM SIGAda annual conference on High integrity language technology
October 2014
116 pages
ISBN:9781450332170
DOI:10.1145/2663171
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 October 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. java pathfinder
  2. model checking
  3. udp networks

Qualifiers

  • Research-article

Conference

HILT '14
Sponsor:

Acceptance Rates

HILT '14 Paper Acceptance Rate 12 of 20 submissions, 60%;
Overall Acceptance Rate 27 of 48 submissions, 56%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Model-Agnostic and Efficient Exploration of Numerical Congestion Control State Space of Real-World TCP ImplementationsIEEE/ACM Transactions on Networking10.1109/TNET.2021.307816129:5(1990-2004)Online publication date: Oct-2021
  • (2019)Model-agnostic and efficient exploration of numerical state space of real-world TCP congestion control implementationsProceedings of the 16th USENIX Conference on Networked Systems Design and Implementation10.5555/3323234.3323292(719-733)Online publication date: 26-Feb-2019
  • (2017)Improving the cost-effectiveness of symbolic testing techniques for transport protocol implementations under packet dynamicsProceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3092703.3092706(79-89)Online publication date: 10-Jul-2017
  • (2015)Software Model Checking of UDP-based Distributed ApplicationsInternational Journal of Networking and Computing10.15803/ijnc.5.2_3735:2(373-402)Online publication date: 2015
  • (2015)Cardinality of UDP Transmission OutcomesProceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications - Volume 940910.1007/978-3-319-25942-0_8(120-134)Online publication date: 4-Nov-2015

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media