TY - GEN
T1 - Network protocol safe configuration search in one shot
AU - Li, You
AU - Hou, Kaiyu
AU - Zhou, Hai
AU - Chen, Yan
N1 - Publisher Copyright:
© 2020 Owner/Author.
PY - 2020/8/10
Y1 - 2020/8/10
N2 - Model checking techniques can verify correctness properties by exhaustively traversing the state space of a formal model. A large number of works [1, 4, 5] done by networking researchers use model checking. Each of the works comes with one or more formal models, which constitutes a valuable asset for the networking security research community. Nevertheless, we find these works do not fully exploit the potentials of their models.
AB - Model checking techniques can verify correctness properties by exhaustively traversing the state space of a formal model. A large number of works [1, 4, 5] done by networking researchers use model checking. Each of the works comes with one or more formal models, which constitutes a valuable asset for the networking security research community. Nevertheless, we find these works do not fully exploit the potentials of their models.
KW - Model checking
KW - Network system configuration
KW - Protocol security
UR - http://www.scopus.com/inward/record.url?scp=85115716004&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85115716004&partnerID=8YFLogxK
U2 - 10.1145/3405837.3411377
DO - 10.1145/3405837.3411377
M3 - Conference contribution
AN - SCOPUS:85115716004
T3 - Proceedings of the SIGCOMM 2020 Poster and Demo Sessions, SIGCOMM 2020
SP - 21
EP - 23
BT - Proceedings of the SIGCOMM 2020 Poster and Demo Sessions, SIGCOMM 2020
PB - Association for Computing Machinery, Inc
T2 - 2020 Annual Conference of the ACM Special Interest Group on Data Communication on the Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM 2020
Y2 - 10 August 2020 through 14 August 2020
ER -