A survey on network verification and testing with formal methods: Approaches and challenges

Y Li, X Yin, Z Wang, J Yao, X Shi, J Wu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Networks have grown increasingly complicated. Violations of intended policies can
compromise network availability and network reliability. Network operators need to ensure …

Applying formal methods to networking: theory, techniques, and applications

J Qadir, O Hasan - IEEE Communications Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Despite its great importance, modern network infrastructure is remarkable for the lack of rigor
in its engineering. The Internet, which began as a research experiment, was never designed …

The stable paths problem and interdomain routing

TG Griffin, FB Shepherd… - IEEE/ACM Transactions On …, 2002 - ieeexplore.ieee.org
Dynamic routing protocols such as RIP and OSPF essentially implement distributed
algorithms for solving the shortest paths problem. The border gateway protocol (BGP) is …

[PDF][PDF] Detecting BGP configuration faults with static analysis

N Feamster, H Balakrishnan - Proceedings of the 2nd conference on …, 2005 - usenix.org
The Internet is composed of many independent autonomous systems (ASes) that exchange
reachability information to destinations using the Border Gateway Protocol (BGP). Network …

Symnet: Scalable symbolic execution for modern networks

R Stoenescu, M Popovici, L Negreanu… - Proceedings of the 2016 …, 2016 - dl.acm.org
We present SymNet, a network static analysis tool based on symbolic execution. SymNet
injects symbolic packets and tracks their evolution through the network. Our key novelty is …

A framework for security analysis of mobile wireless networks

S Nanz, C Hankin - Theoretical Computer Science, 2006 - Elsevier
We present a framework for specification and security analysis of communication protocols
for mobile wireless networks. This setting introduces new challenges which are not being …

A safe path vector protocol

TG Griffin, G Wilfong - … Annual Joint Conference of the IEEE …, 2000 - ieeexplore.ieee.org
An IP routing protocol is safe if it is guaranteed to converge in the absence of network
topology changes. BGP, currently the only interdomain routing protocol employed on the …

Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and Sockets

S Bishop, M Fairbairn, M Norrish, P Sewell… - Proceedings of the …, 2005 - dl.acm.org
Network protocols are hard to implement correctly. Despite the existence of RFCs and other
standards, implementations often have subtle differences and bugs. One reason for this is …

A process algebra for wireless mesh networks

A Fehnker, R Van Glabbeek, P Höfner, A McIver… - … 2012, Held as Part of the …, 2012 - Springer
We propose a process algebra for wireless mesh networks that combines novel treatments
of local broadcast, conditional unicast and data structures. In this framework, we model the …

Verisim: Formal analysis of network simulations

K Bhargavan, CA Gunter, M Kim, I Lee… - IEEE Transactions …, 2002 - ieeexplore.ieee.org
Network protocols are often analyzed using simulations. We demonstrate how to extend
such simulations to check propositions expressing safety properties of network event traces …