TY - GEN
T1 - Wireless protocol validation under uncertainty
AU - Shi, Jinghao
AU - Lahiri, Shuvendu K.
AU - Chandra, Ranveer
AU - Challen, Geoffrey
N1 - Publisher Copyright:
© Springer International Publishing AG 2016.
PY - 2016
Y1 - 2016
N2 - Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavior without instrumentation, but they introduce new validation challenges. Losses caused by wireless propagation prevent sniffers from perfectly reconstructing the actual DUT packet trace. As a result, accurate validation requires distinguishing between specification deviations that represent implementation errors and those caused by sniffer uncertainty. We present a new approach enabling sniffer-based validation of wireless protocol implementations. Beginning with the original protocol monitor state machine, we automatically and completely encode sniffer uncertainty by selectively adding non-deterministic transitions. We characterize the NP-completeness of the resulting decision problem and provide an exhaustive algorithm for searching over all mutated traces. We also present practical protocol-oblivious heuristics for searching over the most likely mutated traces.We have implemented our framework and show that it can accurately identify implementation errors in the face of uncertainty.
AB - Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). The DUT may not implement the required instrumentation, or the instrumentation may alter the DUT’s behavior when enabled. Wireless sniffers can monitor the DUT’s behavior without instrumentation, but they introduce new validation challenges. Losses caused by wireless propagation prevent sniffers from perfectly reconstructing the actual DUT packet trace. As a result, accurate validation requires distinguishing between specification deviations that represent implementation errors and those caused by sniffer uncertainty. We present a new approach enabling sniffer-based validation of wireless protocol implementations. Beginning with the original protocol monitor state machine, we automatically and completely encode sniffer uncertainty by selectively adding non-deterministic transitions. We characterize the NP-completeness of the resulting decision problem and provide an exhaustive algorithm for searching over all mutated traces. We also present practical protocol-oblivious heuristics for searching over the most likely mutated traces.We have implemented our framework and show that it can accurately identify implementation errors in the face of uncertainty.
UR - http://www.scopus.com/inward/record.url?scp=84990202503&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84990202503&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-46982-9_22
DO - 10.1007/978-3-319-46982-9_22
M3 - Conference contribution
AN - SCOPUS:84990202503
SN - 9783319469812
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 351
EP - 367
BT - Runtime Verification - 16th International Conference, RV 2016, Proceedings
A2 - Falcone, Yliès
A2 - Sánchez, César
PB - Springer
T2 - 16th International Conference on Runtime Verification, RV 2016
Y2 - 23 September 2016 through 30 September 2016
ER -