Using dominators to extract observable protocol contexts

Mahadevan Subramaniam, Jiangfan Shi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

While verifying complex protocols, it is often fruitful to consider all protocol contexts in which an interesting set of transitions may appear. The contexts are represented as yet another protocol called observable protocol that may be further analyzed. An efficient approach based on static analysis to compute an over-approximated protocol that includes all the runs of an observable protocol is described. The approach uses dominator relations over state and message dependency graphs. An over-approximation of transitions that occur with an interesting transition in any run are produced, from which a transition relation of the over-approximated protocol is automatically generated. To facilitate systematic state space exploration of the over approximated protocol, it is shown how a series of under-approximations can be generated by identifying parallelism among the transitions using dominators. The effectiveness of the proposed approach is illustrated by model checking several examples including several coherence protocols.

Original languageEnglish (US)
Title of host publicationProceedings - 3rd IEEE International Conference on Software Engineering and Formal Methods, SEFM 2005
Pages96-105
Number of pages10
DOIs
StatePublished - 2005
Event3rd IEEE International Conference on Software Engineering and Formal Methods, SEFM 2005 - Koblenz, Germany
Duration: Sep 7 2005Sep 9 2005

Publication series

NameProceedings - 3rd IEEE International Conference on Software Engineering and Formal Methods, SEFM 2005

Conference

Conference3rd IEEE International Conference on Software Engineering and Formal Methods, SEFM 2005
Country/TerritoryGermany
CityKoblenz
Period9/7/059/9/05

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Using dominators to extract observable protocol contexts'. Together they form a unique fingerprint.

Cite this