In this paper we propose a methodology for model-checking based verification of large SDL specifications. The methodology is illustrated by a case study of an industrial medium-access protocol for wireless ATM. To cope with the state space explosion, the verification exploits the layered and modular structure of the protocol’s SDL specification and proceeds in a bottom-up compositional way. To make a compositional approach feasible in practice, we develop a technique for losing SDL components with a chaotic environment without incurring the state-space penalty of considering all possible combinations of values in the input queues. The compositional arguments are used in combination with abstraction techniques to further reduce the state spa...
AbstractA methodology for system-level hardware verification based on compositional model checking i...
It is important to reason about a number of desirable protocol properties to ensure correctness of a...
Abstract. This paper presents a case study in the application of formal methods to the verification ...
In this paper we propose a methodology for model-checking based verification of large SDL specificat...
Industrial-size specifications/models (whose state space is often infinite) can not be model checked...
Formally defined Specification and Description Language (SDL) is used for the design and specificati...
Model checkers like Spin can handle closed reactive systems, only. Thus to handle open systems, in p...
In this paper a high-level Petri net semantics for SDL (Specification and Description Language) is p...
Protocol verification is a key component to hardware and software design. The proliferation of concu...
Network protocols must work. The effects of protocol specification or implementation errors range fr...
Abstract. Soft state provides new services to packet-switching networks by introducing a type of sta...
Model checking is a powerful approach to verification of distributed systems. The sweep-line method ...
An integration of deductive verification and model checking have been investigated in numerous works...
A typical problem formal verification faces is the size of the model of a system being verified. Eve...
We describe the design and implementation of an interface that compiles an SDL protocol specificatio...
AbstractA methodology for system-level hardware verification based on compositional model checking i...
It is important to reason about a number of desirable protocol properties to ensure correctness of a...
Abstract. This paper presents a case study in the application of formal methods to the verification ...
In this paper we propose a methodology for model-checking based verification of large SDL specificat...
Industrial-size specifications/models (whose state space is often infinite) can not be model checked...
Formally defined Specification and Description Language (SDL) is used for the design and specificati...
Model checkers like Spin can handle closed reactive systems, only. Thus to handle open systems, in p...
In this paper a high-level Petri net semantics for SDL (Specification and Description Language) is p...
Protocol verification is a key component to hardware and software design. The proliferation of concu...
Network protocols must work. The effects of protocol specification or implementation errors range fr...
Abstract. Soft state provides new services to packet-switching networks by introducing a type of sta...
Model checking is a powerful approach to verification of distributed systems. The sweep-line method ...
An integration of deductive verification and model checking have been investigated in numerous works...
A typical problem formal verification faces is the size of the model of a system being verified. Eve...
We describe the design and implementation of an interface that compiles an SDL protocol specificatio...
AbstractA methodology for system-level hardware verification based on compositional model checking i...
It is important to reason about a number of desirable protocol properties to ensure correctness of a...
Abstract. This paper presents a case study in the application of formal methods to the verification ...