The notion of belief has been useful in reasoning about authentication protocols. In this paper, we show how the notion of belief can be applied to reasoning about cache coherence in a distributed file system. To the best of our knowledge, this is the first formal analysis of this problem. We used an extended subset of a logic of authentication [4, 5] to help us analyze three cache coherence protocols: a validate-on-use protocol, an invalidation-based protocol, and a new large granulari ~ protocol for use in weakly connected environments. In this paper, we present two runs from the large granularity protocol. Using our variant of the logic of authentication, we were able to find flaws in the design of the large granularity protocol. We foun...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
We propose a heuristic-based method for discovering inductive invariants in the parameterized verifi...
The goal of an authentication system is to verify and authorise users, in order to protect restricte...
The notion of belief has been useful in reasoning about authentication protocols. In this paper, we ...
Abstract. Analysis methods for cryptographic protocols have often focused on information leakage rat...
Questions of belief are essential in analyzing protocols for the authentication of principals in dis...
Model checking is a proven successful technology for verifying hardware. It works, however, on only ...
In this paper we describe our experience with Teapot [7], a domain-specific language for writing cac...
Abstract. This paper presents a case study of the application of the knowledge-based approach to con...
This invited paper argues that to facilitate formal verification, multiprocessor systems should (1) ...
In this paper, we describe Teapot, a domain-specific language for writing cache coherence protocols....
Weak connectivity is characterized by slow or intermittent networks. Distributed file systems using ...
Cache coherency is one of the major issues in multicore systems. Formal methods, in particular model...
v Abstract Caching has long been recognized as a powerful performance enhancement technique in many...
Debugging complex software systems is a major problem. Proving properties of software systems can be...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
We propose a heuristic-based method for discovering inductive invariants in the parameterized verifi...
The goal of an authentication system is to verify and authorise users, in order to protect restricte...
The notion of belief has been useful in reasoning about authentication protocols. In this paper, we ...
Abstract. Analysis methods for cryptographic protocols have often focused on information leakage rat...
Questions of belief are essential in analyzing protocols for the authentication of principals in dis...
Model checking is a proven successful technology for verifying hardware. It works, however, on only ...
In this paper we describe our experience with Teapot [7], a domain-specific language for writing cac...
Abstract. This paper presents a case study of the application of the knowledge-based approach to con...
This invited paper argues that to facilitate formal verification, multiprocessor systems should (1) ...
In this paper, we describe Teapot, a domain-specific language for writing cache coherence protocols....
Weak connectivity is characterized by slow or intermittent networks. Distributed file systems using ...
Cache coherency is one of the major issues in multicore systems. Formal methods, in particular model...
v Abstract Caching has long been recognized as a powerful performance enhancement technique in many...
Debugging complex software systems is a major problem. Proving properties of software systems can be...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
We propose a heuristic-based method for discovering inductive invariants in the parameterized verifi...
The goal of an authentication system is to verify and authorise users, in order to protect restricte...