Network Protocol Safe Configuration Search in One Shot

You Li,Kaiyu Hou,Hai Zhou,Yan Chen
DOI: https://doi.org/10.1145/3405837.3411377
2020-01-01
Abstract:Model checking techniques can verify correctness properties by exhaustively traversing the state space of a formal model. A large number of works [1, 4, 5] done by networking researchers use model checking. Each of the works comes with one or more formal models, which constitutes a valuable asset for the networking security research community. Nevertheless, we find these works do not fully exploit the potentials of their models.
What problem does this paper attempt to address?