Loading…
Wireless protocol validation under uncertainty
Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavi...
Saved in:
Published in: | Formal methods in system design 2018-08, Vol.53 (1), p.33-53 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243 |
---|---|
cites | cdi_FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243 |
container_end_page | 53 |
container_issue | 1 |
container_start_page | 33 |
container_title | Formal methods in system design |
container_volume | 53 |
creator | Shi, Jinghao Lahiri, Shuvendu K. Chandra, Ranveer Challen, Geoffrey |
description | Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavior without instrumentation, but they introduce new validation challenges. Losses caused by wireless propagation prevent sniffers from perfectly reconstructing the actual DUT packet trace. As a result, accurate validation requires distinguishing between specification deviations that represent implementation errors and those caused by sniffer uncertainty. We present a new approach enabling sniffer-based validation of wireless protocol implementations. Beginning with the original protocol monitor state machine, we automatically and completely encode sniffer uncertainty by selectively adding non-deterministic transitions. We characterize the NP-completeness of the resulting decision problem and provide an exhaustive algorithm for searching over all mutated traces. We also present practical protocol-oblivious heuristics for searching over the most likely mutated traces. We have implemented our framework and show that it can accurately identify implementation errors in the face of uncertainty. |
doi_str_mv | 10.1007/s10703-017-0309-4 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2084979731</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2084979731</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243</originalsourceid><addsrcrecordid>eNp1kE1LxDAQhoMoWFd_gLeC56wzaZImR1n8ggUviseQTVLpUts1SYX997ZU8ORl5vK87wwPIdcIawSobxNCDRUFrClUoCk_IQWKmlGFwE5JAZoJqpWQ5-QipT0AKJRVQdbvbQxdSKk8xCEPbujKb9u13uZ26Mux9yFO04WYbdvn4yU5a2yXwtXvXpG3h_vXzRPdvjw-b-621FUoM0XunQ56JxVqRG9lQEDrpFSNBS-Y14HBruHOiQY4t9YFqYQA7hhqz3i1IjdL7_TV1xhSNvthjP100jBQXNe6rnCicKFcHFKKoTGH2H7aeDQIZtZiFi1m0mJmLWZuZksmTWz_EeJf8_-hH9GSZIQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2084979731</pqid></control><display><type>article</type><title>Wireless protocol validation under uncertainty</title><source>Springer Nature</source><creator>Shi, Jinghao ; Lahiri, Shuvendu K. ; Chandra, Ranveer ; Challen, Geoffrey</creator><creatorcontrib>Shi, Jinghao ; Lahiri, Shuvendu K. ; Chandra, Ranveer ; Challen, Geoffrey</creatorcontrib><description>Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavior without instrumentation, but they introduce new validation challenges. Losses caused by wireless propagation prevent sniffers from perfectly reconstructing the actual DUT packet trace. As a result, accurate validation requires distinguishing between specification deviations that represent implementation errors and those caused by sniffer uncertainty. We present a new approach enabling sniffer-based validation of wireless protocol implementations. Beginning with the original protocol monitor state machine, we automatically and completely encode sniffer uncertainty by selectively adding non-deterministic transitions. We characterize the NP-completeness of the resulting decision problem and provide an exhaustive algorithm for searching over all mutated traces. We also present practical protocol-oblivious heuristics for searching over the most likely mutated traces. We have implemented our framework and show that it can accurately identify implementation errors in the face of uncertainty.</description><identifier>ISSN: 0925-9856</identifier><identifier>EISSN: 1572-8102</identifier><identifier>DOI: 10.1007/s10703-017-0309-4</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>CAE) and Design ; Circuits and Systems ; Computer-Aided Engineering (CAD ; Electrical Engineering ; Engineering ; Instruments ; Searching ; Software Engineering/Programming and Operating Systems ; Uncertainty</subject><ispartof>Formal methods in system design, 2018-08, Vol.53 (1), p.33-53</ispartof><rights>pringer Science+Business Media, LLC, part of Springer Nature 2017</rights><rights>Copyright Springer Science & Business Media 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243</citedby><cites>FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243</cites><orcidid>0000-0002-6516-9865</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Shi, Jinghao</creatorcontrib><creatorcontrib>Lahiri, Shuvendu K.</creatorcontrib><creatorcontrib>Chandra, Ranveer</creatorcontrib><creatorcontrib>Challen, Geoffrey</creatorcontrib><title>Wireless protocol validation under uncertainty</title><title>Formal methods in system design</title><addtitle>Form Methods Syst Des</addtitle><description>Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavior without instrumentation, but they introduce new validation challenges. Losses caused by wireless propagation prevent sniffers from perfectly reconstructing the actual DUT packet trace. As a result, accurate validation requires distinguishing between specification deviations that represent implementation errors and those caused by sniffer uncertainty. We present a new approach enabling sniffer-based validation of wireless protocol implementations. Beginning with the original protocol monitor state machine, we automatically and completely encode sniffer uncertainty by selectively adding non-deterministic transitions. We characterize the NP-completeness of the resulting decision problem and provide an exhaustive algorithm for searching over all mutated traces. We also present practical protocol-oblivious heuristics for searching over the most likely mutated traces. We have implemented our framework and show that it can accurately identify implementation errors in the face of uncertainty.</description><subject>CAE) and Design</subject><subject>Circuits and Systems</subject><subject>Computer-Aided Engineering (CAD</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Instruments</subject><subject>Searching</subject><subject>Software Engineering/Programming and Operating Systems</subject><subject>Uncertainty</subject><issn>0925-9856</issn><issn>1572-8102</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp1kE1LxDAQhoMoWFd_gLeC56wzaZImR1n8ggUviseQTVLpUts1SYX997ZU8ORl5vK87wwPIdcIawSobxNCDRUFrClUoCk_IQWKmlGFwE5JAZoJqpWQ5-QipT0AKJRVQdbvbQxdSKk8xCEPbujKb9u13uZ26Mux9yFO04WYbdvn4yU5a2yXwtXvXpG3h_vXzRPdvjw-b-621FUoM0XunQ56JxVqRG9lQEDrpFSNBS-Y14HBruHOiQY4t9YFqYQA7hhqz3i1IjdL7_TV1xhSNvthjP100jBQXNe6rnCicKFcHFKKoTGH2H7aeDQIZtZiFi1m0mJmLWZuZksmTWz_EeJf8_-hH9GSZIQ</recordid><startdate>20180801</startdate><enddate>20180801</enddate><creator>Shi, Jinghao</creator><creator>Lahiri, Shuvendu K.</creator><creator>Chandra, Ranveer</creator><creator>Challen, Geoffrey</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-6516-9865</orcidid></search><sort><creationdate>20180801</creationdate><title>Wireless protocol validation under uncertainty</title><author>Shi, Jinghao ; Lahiri, Shuvendu K. ; Chandra, Ranveer ; Challen, Geoffrey</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CAE) and Design</topic><topic>Circuits and Systems</topic><topic>Computer-Aided Engineering (CAD</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Instruments</topic><topic>Searching</topic><topic>Software Engineering/Programming and Operating Systems</topic><topic>Uncertainty</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shi, Jinghao</creatorcontrib><creatorcontrib>Lahiri, Shuvendu K.</creatorcontrib><creatorcontrib>Chandra, Ranveer</creatorcontrib><creatorcontrib>Challen, Geoffrey</creatorcontrib><collection>CrossRef</collection><jtitle>Formal methods in system design</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shi, Jinghao</au><au>Lahiri, Shuvendu K.</au><au>Chandra, Ranveer</au><au>Challen, Geoffrey</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Wireless protocol validation under uncertainty</atitle><jtitle>Formal methods in system design</jtitle><stitle>Form Methods Syst Des</stitle><date>2018-08-01</date><risdate>2018</risdate><volume>53</volume><issue>1</issue><spage>33</spage><epage>53</epage><pages>33-53</pages><issn>0925-9856</issn><eissn>1572-8102</eissn><abstract>Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavior without instrumentation, but they introduce new validation challenges. Losses caused by wireless propagation prevent sniffers from perfectly reconstructing the actual DUT packet trace. As a result, accurate validation requires distinguishing between specification deviations that represent implementation errors and those caused by sniffer uncertainty. We present a new approach enabling sniffer-based validation of wireless protocol implementations. Beginning with the original protocol monitor state machine, we automatically and completely encode sniffer uncertainty by selectively adding non-deterministic transitions. We characterize the NP-completeness of the resulting decision problem and provide an exhaustive algorithm for searching over all mutated traces. We also present practical protocol-oblivious heuristics for searching over the most likely mutated traces. We have implemented our framework and show that it can accurately identify implementation errors in the face of uncertainty.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10703-017-0309-4</doi><tpages>21</tpages><orcidid>https://orcid.org/0000-0002-6516-9865</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0925-9856 |
ispartof | Formal methods in system design, 2018-08, Vol.53 (1), p.33-53 |
issn | 0925-9856 1572-8102 |
language | eng |
recordid | cdi_proquest_journals_2084979731 |
source | Springer Nature |
subjects | CAE) and Design Circuits and Systems Computer-Aided Engineering (CAD Electrical Engineering Engineering Instruments Searching Software Engineering/Programming and Operating Systems Uncertainty |
title | Wireless protocol validation under uncertainty |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T13%3A44%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Wireless%20protocol%20validation%20under%20uncertainty&rft.jtitle=Formal%20methods%20in%20system%20design&rft.au=Shi,%20Jinghao&rft.date=2018-08-01&rft.volume=53&rft.issue=1&rft.spage=33&rft.epage=53&rft.pages=33-53&rft.issn=0925-9856&rft.eissn=1572-8102&rft_id=info:doi/10.1007/s10703-017-0309-4&rft_dat=%3Cproquest_cross%3E2084979731%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2084979731&rft_id=info:pmid/&rfr_iscdi=true |