Loading…

Wireless protocol validation under uncertainty

Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavi...

Full description

Saved in:
Bibliographic Details
Published in:Formal methods in system design 2018-08, Vol.53 (1), p.33-53
Main Authors: Shi, Jinghao, Lahiri, Shuvendu K., Chandra, Ranveer, Challen, Geoffrey
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243
cites cdi_FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243
container_end_page 53
container_issue 1
container_start_page 33
container_title Formal methods in system design
container_volume 53
creator Shi, Jinghao
Lahiri, Shuvendu K.
Chandra, Ranveer
Challen, Geoffrey
description Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavior without instrumentation, but they introduce new validation challenges. Losses caused by wireless propagation prevent sniffers from perfectly reconstructing the actual DUT packet trace. As a result, accurate validation requires distinguishing between specification deviations that represent implementation errors and those caused by sniffer uncertainty. We present a new approach enabling sniffer-based validation of wireless protocol implementations. Beginning with the original protocol monitor state machine, we automatically and completely encode sniffer uncertainty by selectively adding non-deterministic transitions. We characterize the NP-completeness of the resulting decision problem and provide an exhaustive algorithm for searching over all mutated traces. We also present practical protocol-oblivious heuristics for searching over the most likely mutated traces. We have implemented our framework and show that it can accurately identify implementation errors in the face of uncertainty.
doi_str_mv 10.1007/s10703-017-0309-4
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2084979731</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2084979731</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243</originalsourceid><addsrcrecordid>eNp1kE1LxDAQhoMoWFd_gLeC56wzaZImR1n8ggUviseQTVLpUts1SYX997ZU8ORl5vK87wwPIdcIawSobxNCDRUFrClUoCk_IQWKmlGFwE5JAZoJqpWQ5-QipT0AKJRVQdbvbQxdSKk8xCEPbujKb9u13uZ26Mux9yFO04WYbdvn4yU5a2yXwtXvXpG3h_vXzRPdvjw-b-621FUoM0XunQ56JxVqRG9lQEDrpFSNBS-Y14HBruHOiQY4t9YFqYQA7hhqz3i1IjdL7_TV1xhSNvthjP100jBQXNe6rnCicKFcHFKKoTGH2H7aeDQIZtZiFi1m0mJmLWZuZksmTWz_EeJf8_-hH9GSZIQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2084979731</pqid></control><display><type>article</type><title>Wireless protocol validation under uncertainty</title><source>Springer Nature</source><creator>Shi, Jinghao ; Lahiri, Shuvendu K. ; Chandra, Ranveer ; Challen, Geoffrey</creator><creatorcontrib>Shi, Jinghao ; Lahiri, Shuvendu K. ; Chandra, Ranveer ; Challen, Geoffrey</creatorcontrib><description>Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavior without instrumentation, but they introduce new validation challenges. Losses caused by wireless propagation prevent sniffers from perfectly reconstructing the actual DUT packet trace. As a result, accurate validation requires distinguishing between specification deviations that represent implementation errors and those caused by sniffer uncertainty. We present a new approach enabling sniffer-based validation of wireless protocol implementations. Beginning with the original protocol monitor state machine, we automatically and completely encode sniffer uncertainty by selectively adding non-deterministic transitions. We characterize the NP-completeness of the resulting decision problem and provide an exhaustive algorithm for searching over all mutated traces. We also present practical protocol-oblivious heuristics for searching over the most likely mutated traces. We have implemented our framework and show that it can accurately identify implementation errors in the face of uncertainty.</description><identifier>ISSN: 0925-9856</identifier><identifier>EISSN: 1572-8102</identifier><identifier>DOI: 10.1007/s10703-017-0309-4</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>CAE) and Design ; Circuits and Systems ; Computer-Aided Engineering (CAD ; Electrical Engineering ; Engineering ; Instruments ; Searching ; Software Engineering/Programming and Operating Systems ; Uncertainty</subject><ispartof>Formal methods in system design, 2018-08, Vol.53 (1), p.33-53</ispartof><rights>pringer Science+Business Media, LLC, part of Springer Nature 2017</rights><rights>Copyright Springer Science &amp; Business Media 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243</citedby><cites>FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243</cites><orcidid>0000-0002-6516-9865</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Shi, Jinghao</creatorcontrib><creatorcontrib>Lahiri, Shuvendu K.</creatorcontrib><creatorcontrib>Chandra, Ranveer</creatorcontrib><creatorcontrib>Challen, Geoffrey</creatorcontrib><title>Wireless protocol validation under uncertainty</title><title>Formal methods in system design</title><addtitle>Form Methods Syst Des</addtitle><description>Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavior without instrumentation, but they introduce new validation challenges. Losses caused by wireless propagation prevent sniffers from perfectly reconstructing the actual DUT packet trace. As a result, accurate validation requires distinguishing between specification deviations that represent implementation errors and those caused by sniffer uncertainty. We present a new approach enabling sniffer-based validation of wireless protocol implementations. Beginning with the original protocol monitor state machine, we automatically and completely encode sniffer uncertainty by selectively adding non-deterministic transitions. We characterize the NP-completeness of the resulting decision problem and provide an exhaustive algorithm for searching over all mutated traces. We also present practical protocol-oblivious heuristics for searching over the most likely mutated traces. We have implemented our framework and show that it can accurately identify implementation errors in the face of uncertainty.</description><subject>CAE) and Design</subject><subject>Circuits and Systems</subject><subject>Computer-Aided Engineering (CAD</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Instruments</subject><subject>Searching</subject><subject>Software Engineering/Programming and Operating Systems</subject><subject>Uncertainty</subject><issn>0925-9856</issn><issn>1572-8102</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp1kE1LxDAQhoMoWFd_gLeC56wzaZImR1n8ggUviseQTVLpUts1SYX997ZU8ORl5vK87wwPIdcIawSobxNCDRUFrClUoCk_IQWKmlGFwE5JAZoJqpWQ5-QipT0AKJRVQdbvbQxdSKk8xCEPbujKb9u13uZ26Mux9yFO04WYbdvn4yU5a2yXwtXvXpG3h_vXzRPdvjw-b-621FUoM0XunQ56JxVqRG9lQEDrpFSNBS-Y14HBruHOiQY4t9YFqYQA7hhqz3i1IjdL7_TV1xhSNvthjP100jBQXNe6rnCicKFcHFKKoTGH2H7aeDQIZtZiFi1m0mJmLWZuZksmTWz_EeJf8_-hH9GSZIQ</recordid><startdate>20180801</startdate><enddate>20180801</enddate><creator>Shi, Jinghao</creator><creator>Lahiri, Shuvendu K.</creator><creator>Chandra, Ranveer</creator><creator>Challen, Geoffrey</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-6516-9865</orcidid></search><sort><creationdate>20180801</creationdate><title>Wireless protocol validation under uncertainty</title><author>Shi, Jinghao ; Lahiri, Shuvendu K. ; Chandra, Ranveer ; Challen, Geoffrey</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CAE) and Design</topic><topic>Circuits and Systems</topic><topic>Computer-Aided Engineering (CAD</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Instruments</topic><topic>Searching</topic><topic>Software Engineering/Programming and Operating Systems</topic><topic>Uncertainty</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shi, Jinghao</creatorcontrib><creatorcontrib>Lahiri, Shuvendu K.</creatorcontrib><creatorcontrib>Chandra, Ranveer</creatorcontrib><creatorcontrib>Challen, Geoffrey</creatorcontrib><collection>CrossRef</collection><jtitle>Formal methods in system design</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shi, Jinghao</au><au>Lahiri, Shuvendu K.</au><au>Chandra, Ranveer</au><au>Challen, Geoffrey</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Wireless protocol validation under uncertainty</atitle><jtitle>Formal methods in system design</jtitle><stitle>Form Methods Syst Des</stitle><date>2018-08-01</date><risdate>2018</risdate><volume>53</volume><issue>1</issue><spage>33</spage><epage>53</epage><pages>33-53</pages><issn>0925-9856</issn><eissn>1572-8102</eissn><abstract>Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavior without instrumentation, but they introduce new validation challenges. Losses caused by wireless propagation prevent sniffers from perfectly reconstructing the actual DUT packet trace. As a result, accurate validation requires distinguishing between specification deviations that represent implementation errors and those caused by sniffer uncertainty. We present a new approach enabling sniffer-based validation of wireless protocol implementations. Beginning with the original protocol monitor state machine, we automatically and completely encode sniffer uncertainty by selectively adding non-deterministic transitions. We characterize the NP-completeness of the resulting decision problem and provide an exhaustive algorithm for searching over all mutated traces. We also present practical protocol-oblivious heuristics for searching over the most likely mutated traces. We have implemented our framework and show that it can accurately identify implementation errors in the face of uncertainty.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10703-017-0309-4</doi><tpages>21</tpages><orcidid>https://orcid.org/0000-0002-6516-9865</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0925-9856
ispartof Formal methods in system design, 2018-08, Vol.53 (1), p.33-53
issn 0925-9856
1572-8102
language eng
recordid cdi_proquest_journals_2084979731
source Springer Nature
subjects CAE) and Design
Circuits and Systems
Computer-Aided Engineering (CAD
Electrical Engineering
Engineering
Instruments
Searching
Software Engineering/Programming and Operating Systems
Uncertainty
title Wireless protocol validation under uncertainty
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T13%3A44%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Wireless%20protocol%20validation%20under%20uncertainty&rft.jtitle=Formal%20methods%20in%20system%20design&rft.au=Shi,%20Jinghao&rft.date=2018-08-01&rft.volume=53&rft.issue=1&rft.spage=33&rft.epage=53&rft.pages=33-53&rft.issn=0925-9856&rft.eissn=1572-8102&rft_id=info:doi/10.1007/s10703-017-0309-4&rft_dat=%3Cproquest_cross%3E2084979731%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c316t-14dc9e9b681911da6e101ac668fa0d52d9e20bf4cc5f044aace685504c219d243%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2084979731&rft_id=info:pmid/&rfr_iscdi=true