Proceedings of the 6th ACM &Amp; IEEE International Conference on Embedded Software - EMSOFT '06 2006
DOI: 10.1145/1176887.1176923
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the zeroconf protocol using UPPAAL

Abstract: We report on a case study in which the model checker Uppaal is used to formally model parts of Zeroconf, a protocol for dynamic configuration of IPv4 link-local addresses that has been defined in RFC 3927 of the IETF. Our goal has been to construct a model that (a) is easy to understand by engineers, (b) comes as close as possible to the informal text (for each transition in the model there should be a corresponding piece of text in the RFC), and (c) may serve as a basis for formal verification. Our conclusion… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0
1

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 22 publications
(30 reference statements)
0
7
0
1
Order By: Relevance
“…This model checker has previously and successfully been applied for other communication protocols (e.g. Zeroconf [15]).…”
Section: Formal Validation Using a Model Checkermentioning
confidence: 99%
“…This model checker has previously and successfully been applied for other communication protocols (e.g. Zeroconf [15]).…”
Section: Formal Validation Using a Model Checkermentioning
confidence: 99%
“…Its performance originally comes from zones 3 as a representation for states and the efficient implementation of operators on its canonical data‐structure known as difference‐bound matrix (DBM) 4. Since then the development has been fueled by scientific results on algorithms or new data structures 5–10, academic case‐studies 11–15, industrial case‐studies 16–20, and also teaching 21.…”
Section: Introductionmentioning
confidence: 99%
“…As shown by our earlier work, the system falls into the case of the big state space problem [13,14].To make the testing and verification with fixed parameter values practically feasible, several abstraction techniques have been applied in the modeling previously. Still the same for the manual proof in our current paper, there is no interconnection between any two of the CPUs, and each voter can independently judge whether its corresponding CPU needs a restart.…”
Section: Introductionmentioning
confidence: 99%