期刊文献+

基于模型检查的TCP连接管理协议分析与验证

Analysis and verif TCP connection management protocol based on model checking
下载PDF
导出
摘要 随着网络协议复杂性的增大,如何发现其自身的潜在错误变得非常重要。为了发现传统测试手段难以检测的错误,采用模型检查技术分析和验证网络协议。从TCP协议设计规范中提取了包含TCP连接管理协议重要细节的形式化模型,并采用模型检查工具SPIN验证协议模型是否满足需求,结果表明,TCP协议设计规范中同同时打开连接过程存在不一致问题,针对该问题提出了改进策略。 The protocol complexity is increasing rapidly. It is important to uncover the potential defects in them. The model checking method is used to analyze and verify network protocols. It can uncover bugs which are difficult to be finding by testing. A formalized of TCP connection management protocol model is extracted form the TCP specification at a significant level of detail. This model is used to examine certain properties of TCP by using the model checker SPIN. Problems with some inconsistent descriptions on TCP concerning simultaneous open procedure are discovered, and corrections to the problems are proposed.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第10期2381-2386,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(60673155 90718008)。
关键词 模型检查 形式化验证 有限状态机 线形时序逻辑 TCP连接管理 model checking formal verification finite state machine linear temporal logic TCP connection management
  • 相关文献

参考文献9

  • 1Postel J.Transmission Control Protocol,RFC793 [S].IETF, 1981.
  • 2Sunshine C A.Formal techniques for protocol specification and verification[J].IEEE Computer, 1979,12(9):20-27.
  • 3Figueiredo JCA,Kristensen L M.Using coloured Petri nets to investigate behavioural and performance issues of TCP protocols [C]. Aarhus, Denmark: 2nd Workshop on the Practical Use of Coloured Petri Nets and Design/CPN, 1999:21-40.
  • 4Billington J,Han B.Modelling and analysing the functional behaviour of TCP's connection management procedures[C].Int J Softw Tools Technol,Transf,2007:269-304.
  • 5Clarke E M, Grumberg O,Peled D.Model checking[C].MIT Press,1999.
  • 6Holzmann G J.The model checker spin[C].IEEE Transactions on Software Engineering,1996,23(5): 1-17.
  • 7He Y T.Verification of the WAP transaction layer using the model checker SP1N[C].Mc.Master University, Also Software Quality Research Laboratory (SQRL) Report,2003.
  • 8Josang A.Security protocol verification using SPIN[C].SPIN'95 Workshop, 1995.
  • 9Obradovic D.Formal analysis of routing protocols[C].University of Pennsylvania,2002.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部