skip to main content
research-article

A framework for model checking UDP network programs with Java pathfinder

Published:18 October 2014Publication History
Skip Abstract Section

Abstract

Complex asynchronous, distributed systems could benefit significantly from model checking, but model checking programs do not natively support verification of distributed software. Several frameworks have been developed recently that apply model checking to networked software, but none of these frameworks support complete modeling of programs that use the User Datagram Protocol (UDP). This paper presents the first framework to model realistic rather than ideal UDP network operations using Java Pathfinder, and describes its use in verifying a distributed UDP-based application.

References

  1. C. Artho and P. Garoche. Accurate centralization for applying model checking on networked applications. In Automated Software Engineering, pages 177--188. IEEE, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. Artho, Leungwattanakit, W., M. Hagiya, and Y. Tanabe. Efficient model checking of networked applications. Objects, Components, Models and Patterns, pages 22--40, 2008.Google ScholarGoogle Scholar
  3. C. Artho, W. Leungwattanakit, M. Hagiya, Y. Tanabe, and M. Yamamoto. Cache-based model checking of networked applications: From linear to branching time. In Automated Software Engineering, pages 447--458. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Barlas and T. Bultan. Netstub: a framework for verification of distributed java applications. In Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering, pages 24--33. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Clarke, O. Grumberg, and D. Peled. Model Checking. The MIT Press, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Haveland and T. Pressburger. Model checking java programs using java pathfinder. International Journal on Software Tools for Technology Transfer, 2(4):366--381, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  7. M. Musuvathi and D. Engler. Model checking large network protocol implementations. In Proceedings of the First Symposium on Networked Systems Design and Implementation, pages 155--168. NSDI, March 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Richards. Bugs as features: Teaching network protocols through debugging. In Proceedings of the thirty-first SIGCSE Technical Symposium on Computer Science Education, pages 24--33. ACM, March 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. Richards and B. Stull. Teaching wireless networks with minimal resources. In Proceedings of the thirty-fifth SIGCSE Technical Symposium on Computer Science Education, pages 306--310. ACM, March 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Richards and N. Waisbrot. Illustrating networking concepts with wireless handheld devices. In Proceedings of the Seventh Annual Conference on Innovation and Technology in Computer Science Education, pages 28--33. ACM, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. N. Shafiei and P. Mehlitz. Extending jpf to verify distributed systems. SIGSOFT Softw. Eng. Notes, 39(1):1--5, February 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. N. Shafiei, E. Ruppert, and J. Ostroff. Model Checking Distributed Java Applications. Unpublished Thesis Proposal. University of York., 2013.Google ScholarGoogle Scholar
  13. S. Stoller and Y. Liu. Transformations for model checking distributed java programs. In Proceedings of the 8th international SPIN workshop on Model checking of software, pages 192--199. Springer-Verlag, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A framework for model checking UDP network programs with Java pathfinder

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGAda Ada Letters
        ACM SIGAda Ada Letters  Volume 34, Issue 3
        HILT '14
        December 2014
        93 pages
        ISSN:1094-3641
        DOI:10.1145/2692956
        Issue’s Table of Contents
        • cover image ACM Conferences
          HILT '14: Proceedings of the 2014 ACM SIGAda annual conference on High integrity language technology
          October 2014
          116 pages
          ISBN:9781450332170
          DOI:10.1145/2663171

        Copyright © 2014 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 October 2014

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!