Network protocol safe configuration search in one shot

You Li, Kaiyu Hou, Hai Zhou, Yan Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Model checking techniques can verify correctness properties by exhaustively traversing the state space of a formal model. A large number of works [1, 4, 5] done by networking researchers use model checking. Each of the works comes with one or more formal models, which constitutes a valuable asset for the networking security research community. Nevertheless, we find these works do not fully exploit the potentials of their models.

Original languageEnglish (US)
Title of host publicationProceedings of the SIGCOMM 2020 Poster and Demo Sessions, SIGCOMM 2020
PublisherAssociation for Computing Machinery, Inc
Pages21-23
Number of pages3
ISBN (Electronic)9781450380485
DOIs
StatePublished - Aug 10 2020
Event2020 Annual Conference of the ACM Special Interest Group on Data Communication on the Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM 2020 - Virtual, Online, United States
Duration: Aug 10 2020Aug 14 2020

Publication series

NameProceedings of the SIGCOMM 2020 Poster and Demo Sessions, SIGCOMM 2020

Conference

Conference2020 Annual Conference of the ACM Special Interest Group on Data Communication on the Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM 2020
Country/TerritoryUnited States
CityVirtual, Online
Period8/10/208/14/20

Keywords

  • Model checking
  • Network system configuration
  • Protocol security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Network protocol safe configuration search in one shot'. Together they form a unique fingerprint.

Cite this