2014
DOI: 10.1007/s10703-014-0216-x
|View full text |Cite
|
Sign up to set email alerts
|

Generating models of infinite-state communication protocols using regular inference with abstraction

Abstract: Abstract. In order to facilitate model-based verification and validation, effort is underway to develop techniques for generating models of communication system components from observations of their external behavior. Most previous such work has employed regular inference techniques which generate modest-size finite-state models. They typically suppress parameters of messages, although these have a significant impact on control flow in many communication protocols. We present a framework, which adapts regular … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 42 publications
(34 citation statements)
references
References 48 publications
(52 reference statements)
0
33
0
1
Order By: Relevance
“…Firstly, we need to account for dependencies between clients. Unlike in pure client/serversettings, like in the TLS protocol [18] or the TCP [3], [21], it is not sufficient to simulate one client to adequately infer a model of the server/broker in MQTT. We need to control multiple clients and record the messages each one has received.…”
Section: Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Firstly, we need to account for dependencies between clients. Unlike in pure client/serversettings, like in the TLS protocol [18] or the TCP [3], [21], it is not sufficient to simulate one client to adequately infer a model of the server/broker in MQTT. We need to control multiple clients and record the messages each one has received.…”
Section: Approachmentioning
confidence: 99%
“…This, however, is a general problem of active automata learning in the MAT framework and an issue for learning almost all non-trivial systems. To deal with this problem, we introduce a mapper component performing abstraction and concretisation [2], [3], [27]. However, unlike in the cited work, we do not refine our abstractions in an iterative manner, but rather use a static mapper throughout the learning phase.…”
Section: Approachmentioning
confidence: 99%
“…Other approaches use AAL to infer data constraints from tests: In [AJUV14], a manually supplied abstraction on the data domain makes it possible to apply finite-state active automata learning techniques to the test cases. The approach has been successfully used in practical applications [ASV10,AdRP13], but a drawback is that a priori insight into the target component's behavior is required, making it not quite black-box.…”
Section: Related Workmentioning
confidence: 99%
“…However, there is still no general dynamic analysis technique for inferring EFSM models with guards and assignments to variables. Existing techniques have restrictions: some limit the available operations on data to comparisons for equality, while others require significant manual effort (e.g., [AJUV14]), and/or rely on access to source code (e.g., [BB13]). …”
Section: Introductionmentioning
confidence: 99%
“…Variations of this algorithm are in use today [8] [6], and are applied to such areas as hardware and software component testing [9], formal model verification [10], hardware reverse engineering [4], and network protocol inference [11]. Recently, work has begun on learning register automata, which allows a memory stack within the learned automata [12], which may improve performance.…”
Section: Related Workmentioning
confidence: 99%