TY - GEN
T1 - Verification of computer switching networks
T2 - 10th International Symposium on Automated Technology for Verification and Analysis, ATVA 2012
AU - Zhang, Shuyuan
AU - Malik, Sharad
AU - McGeer, Rick
PY - 2012
Y1 - 2012
N2 - Formal verification has seen much success in several domains of hardware and software design. For example, in hardware verification there has been much work in the verification of microprocessors (e.g. [1]) and memory systems (e.g. [2]). Similarly, software verification has seen success in device-drivers (e.g. [3]) and concurrent software (e.g. [4]). The area of network verification, which consists of both hardware and software components, has received relatively less attention. Traditionally, the focus in this domain has been on performance and security, with less emphasis on functional correctness. However, increasing complexity is resulting in increasing functional failures and thus prompting interest in verification of key correctness properties. This paper reviews the formal verification techniques that have been used here thus far, with the goal of understanding the characteristics of the problem domain that are helpful for each of the techniques, as well as those that pose specific challenges. Finally, it highlights some interesting research challenges that need to be addressed in this important emerging domain.
AB - Formal verification has seen much success in several domains of hardware and software design. For example, in hardware verification there has been much work in the verification of microprocessors (e.g. [1]) and memory systems (e.g. [2]). Similarly, software verification has seen success in device-drivers (e.g. [3]) and concurrent software (e.g. [4]). The area of network verification, which consists of both hardware and software components, has received relatively less attention. Traditionally, the focus in this domain has been on performance and security, with less emphasis on functional correctness. However, increasing complexity is resulting in increasing functional failures and thus prompting interest in verification of key correctness properties. This paper reviews the formal verification techniques that have been used here thus far, with the goal of understanding the characteristics of the problem domain that are helpful for each of the techniques, as well as those that pose specific challenges. Finally, it highlights some interesting research challenges that need to be addressed in this important emerging domain.
UR - http://www.scopus.com/inward/record.url?scp=84868235959&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84868235959&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-33386-6_1
DO - 10.1007/978-3-642-33386-6_1
M3 - Conference contribution
AN - SCOPUS:84868235959
SN - 9783642333859
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 16
BT - Automated Technology for Verification and Analysis - 10th International Symposium, ATVA 2012, Proceedings
Y2 - 3 October 2012 through 6 October 2012
ER -