An algorithmic procedure for checking safety properties of protocols

A procedure for checking safety properties of communication protocols is presented. A protocol is specified as a collection of communicating finite-state machines (FSMs). Two novel algorithms used in this procedure are described. The first algorithm does incremental composition and reduction of FSMs. It uses three heuristic rules which reduce the number of states in the global FSM by one to two orders of magnitude while maintaining its observational equivalence. The second algorithm checks whether the behavior of one FSM is a subset of another FSM's behavior. This procedure has been applied to the ISDN Q.931 and alternating bit protocols. >

[1]  Scott A. Smolka,et al.  CCS expressions, finite state processes, and three problems of equivalence , 1983, PODC '83.

[2]  Brent Hailpern,et al.  Modular Verification of Computer Communication Protocols , 1983, IEEE Trans. Commun..

[3]  Krishan K. Sabnani An algorithmic technique for protocol verification , 1988, IEEE Trans. Commun..

[4]  Mischa Schwartz,et al.  Verification of a Multidestination Selective Repeat Procedure , 1984, Comput. Networks.

[5]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[6]  P. M. Melliar-Smith,et al.  From State Machines to Temporal Logic: Specification Methods for Protocol Standards , 1982, The Analysis of Concurrent Systems.

[7]  Bengt Jonsson,et al.  Modular verification of asynchronous networks , 1987, PODC '87.

[8]  A. Prasad Sistla,et al.  Automatic verification of finite state concurrent system using temporal logic specifications: a practical approach , 1983, POPL '83.

[9]  Daniel Brand,et al.  Protocol Analysis and Synthesis using a State Transition Model , 1982 .

[10]  Mohamed G. Gouda,et al.  Closed Covers: To Verify Progress for Communicating Finite State Machines , 1984, IEEE Transactions on Software Engineering.

[11]  Robin Milner,et al.  A Calculus of Communicating Systems , 1980, Lecture Notes in Computer Science.

[12]  A. Udaya Shankar,et al.  Protocol Verification via Projections , 1984, IEEE Transactions on Software Engineering.

[13]  Colin H. West An Automated Technique of Communications Protocol Validation , 1978, IEEE Trans. Commun..

[14]  Björn Pehrson,et al.  Abstraction by Structural Reduction , 1983, Protocol Specification, Testing, and Verification.

[15]  Deepinder P. Sidhu,et al.  Automated verification of connection management of NBS class 4 transport protocol , 1984 .