The notion of belief has been useful in reasoning about authentication protocols. In this paper, we show how the notion of belief can be applied to reasoning about cache coherence in a distributed file system. To the best of our knowledge, this is the first formal analysis of this problem. We used an extended subset of a logic of authentication [4, 5] to help us analyze three cache coherence protocols: a validate-on-use protocol, an invalidation-based protocol, and a new large granularity protocol for use in weakly connected environments. In this paper, we present two runs from the large granularity protocol. Using our variant of the logic of authentication, we were able to find flaws in the design of the large granularity protocol. We fou...
We propose a heuristic-based method for discovering inductive invariants in the parameterized verifi...
Model checking is a very successful technique which has been applied in the design and verification ...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
The notion of belief has been useful in reasoning about authentication protocols. In this paper, we ...
Abstract. Analysis methods for cryptographic protocols have often focused on information leakage rat...
Model checking is a proven successful technology for verifying hardware. It works, however, on only ...
Questions of belief are essential in analyzing protocols for the authentication of principals in dis...
In this paper we describe our experience with Teapot [7], a domain-specific language for writing cac...
Abstract. This paper presents a case study of the application of the knowledge-based approach to con...
In this paper, we describe Teapot, a domain-specific language for writing cache coherence protocols....
This invited paper argues that to facilitate formal verification, multiprocessor systems should (1) ...
Weak connectivity is characterized by slow or intermittent networks. Distributed file systems using ...
v Abstract Caching has long been recognized as a powerful performance enhancement technique in many...
Debugging complex software systems is a major problem. Proving properties of software systems can be...
Cache coherency is one of the major issues in multicore systems. Formal methods, in particular model...
We propose a heuristic-based method for discovering inductive invariants in the parameterized verifi...
Model checking is a very successful technique which has been applied in the design and verification ...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
The notion of belief has been useful in reasoning about authentication protocols. In this paper, we ...
Abstract. Analysis methods for cryptographic protocols have often focused on information leakage rat...
Model checking is a proven successful technology for verifying hardware. It works, however, on only ...
Questions of belief are essential in analyzing protocols for the authentication of principals in dis...
In this paper we describe our experience with Teapot [7], a domain-specific language for writing cac...
Abstract. This paper presents a case study of the application of the knowledge-based approach to con...
In this paper, we describe Teapot, a domain-specific language for writing cache coherence protocols....
This invited paper argues that to facilitate formal verification, multiprocessor systems should (1) ...
Weak connectivity is characterized by slow or intermittent networks. Distributed file systems using ...
v Abstract Caching has long been recognized as a powerful performance enhancement technique in many...
Debugging complex software systems is a major problem. Proving properties of software systems can be...
Cache coherency is one of the major issues in multicore systems. Formal methods, in particular model...
We propose a heuristic-based method for discovering inductive invariants in the parameterized verifi...
Model checking is a very successful technique which has been applied in the design and verification ...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...