Proceedings of the Symposium on SDN Research 2018
DOI: 10.1145/3185467.3185499
|View full text |Cite
|
Sign up to set email alerts
|

Uncovering Bugs in P4 Programs with Assertion-based Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0
3

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 57 publications
(42 citation statements)
references
References 23 publications
(18 reference statements)
0
39
0
3
Order By: Relevance
“…Target device-independent or -dependent bugs are present in many real-world P4 applications. Currently, the aforementioned runtime bugs cannot be detected by the existing static analysis approaches [2][3][4][5].…”
Section: Motivating Examplesmentioning
confidence: 99%
See 3 more Smart Citations
“…Target device-independent or -dependent bugs are present in many real-world P4 applications. Currently, the aforementioned runtime bugs cannot be detected by the existing static analysis approaches [2][3][4][5].…”
Section: Motivating Examplesmentioning
confidence: 99%
“…Majorly, the existing tools are based on static analysis [2][3][4][5] of the P4 program and thus, fail to detect the runtime bugs or faults. Considering the example of a target device-independent or -dependent bugs illustrated in §2, the current solutions [2][3][4][5] are not able to detect such bugs, as they rely on static analysis and thus, executing runtime verification to observe the device behavior on various inputs is not feasible. In particular, if the parser in a P4 switch fails to check the IPv4 ihl field, the checksum is updated incorrectly leading to anomaly in the network behavior.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Languages for network function specification exist within industry, including TOSCA [28], a templating metamodel for network function virtualization. Also related is Assert-P4 [13], which is a proposed approach for checking P4 programs that is also based on assertion checking. Combining assertions with symbolic execution, it finds bugs motivated by controller misconfiguration and code circumvention and gives developers that ability to specify properties about their programs.…”
Section: Related Workmentioning
confidence: 99%