skip to main content
10.1145/3343147.3343159acmotherconferencesArticle/Chapter ViewAbstractPublication PagesieccConference Proceedingsconference-collections
research-article

Algebraic Approach to Verification and Testing of Distributed Applications

Published:07 July 2019Publication History

ABSTRACT

Challenges in developing distributed applications have given rise to various different design techniques and technologies. This paper presents an algebraic approach using formal verification and model-based testing that can be applied to different development stages. The insertion modeling system software developed by the authors of this paper is used to implement this approach and to apply it to the model-driven development of distributed systems based on blockchain consensus protocols.

References

  1. Algebraic Programming System, APS, www.apsystem.org.uaGoogle ScholarGoogle Scholar
  2. A. Letichevsky, O. Letychevskyi, and V. Peschanenko, "Insertion Modeling and Its Applications", Computer Science Journal of Moldova, Vol. 24, Issue 3, 2016, pp. 357--370.Google ScholarGoogle Scholar
  3. A. Letichevsky, J. Kapitonova, A. Letichevsky Jr., V. Volkov, S. Baranov, V. Kotlyarov, and T. Weigert, "Basic Protocols, Message Sequence Charts, and the Verification of Requirements Specifications", Computer Networks, 47, 2005, pp. 662--675. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Z3 decision procedure. https://github.com/Z3Prover/z3Google ScholarGoogle Scholar
  5. CVC4 decision procedure. http://cvc4.cs.stanford.eduGoogle ScholarGoogle Scholar
  6. A. Letichevsky and D. Gilbert, "Interaction of agents and environments," in: Recent Trends in Algebraic Development Technique, LNCS 1827 (D. Bert and C. Choppy, eds.), Springer-Verlag, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. ITU-T Recommendation, Z.151, User Requirements Notation (URN) - Language definition.Google ScholarGoogle Scholar
  8. ITU-T Recommendation, Z.120, Message Sequence Charts (MSC).Google ScholarGoogle Scholar
  9. Prometheus consensus protocol, https://github.com/pandoraboxchain/prometheus-pythonGoogle ScholarGoogle Scholar
  10. A. Letichevsky, O. Letychevskyi, and V. Peschanenko, "An Interleaving Reduction for Reachability Checking in Symbolic Modeling", in V. Ermolayev et al. (eds.) Proc. 11-th Int. Conf. ICTERI 2015, Lviv, Ukraine, May 14--16, 2015, CEUR-WS.org/Vol-1356, ISSN 1613-0073, pp. 338--353.Google ScholarGoogle Scholar
  11. P. Cousot, "Formal Verification by Abstract Interpretation", Lecture Notes in Computer Science, 2012, vol. 7211, pp. 3--7, Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Cimatti and A. Griggio, "Software Model Checking via IC3", in P. Madhusudan and S. A. Seshia (eds), Computer Aided Verification (CAV) 2012. Lecture Notes in Computer Science, Vol. 7358, Springer, Berlin, Heidelberg, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Dragoi, T. A. Henzinger, H. Veith, J. Widder, and D. Zufferey, "A Logic-Based Framework for Verifying Consensus Algorithms", Proceedings of the 15th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI), San Diego, CA, USA, January 19--21, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Gervais, G. O. Karame, K. Wust, V. Glykantzis, H. Ritzdorf, and S. Capkun, "On the Security and Performance of Proof of Work Blockchains", Tech. Rep., IACR: Cryptology ePrint Archive, 2016.Google ScholarGoogle Scholar
  15. A. Kiayias, A. Russell, B. David, and R. Oliynykov, "Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol", CRYPTO 2017: Advances in Cryptology, pp. 357--388, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  16. J.-S. Song, C. Cadar, and P. Pietzuch, "SYMBEXNET: Testing Network Protocol Implementations with Symbolic Execution and Rule-based Specifications", IEEE Transactions on Software Engineering, Vol. 40, Issue 7, pp. 695--709, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. K. Cha, T. Avgerinos, A. Rebert, and D. Brumley, "Unleashing Mayhem on Binary Code," Proceedings of the IEEE Symposium on Security and Privacy, pp. 380--394, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. DARPA, "Cyber Grand Challenge." {Online}. Available: https: //www.cybergrandchallenge.com/Google ScholarGoogle Scholar
  19. C. Huang, G. Zhai, and G. Xu, "An Algebraic Approach to Designing Consensus Algorithm of Networked High Dimensional Agents", 36th Chinese Control Conference (CCC), IEEE, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  20. A. Letichevsky, "Algebra of Behavior Transformations and its Applications", in V. B. Kudryavtsev and I. G. Rosenberg (eds.), Structural Theory of Automata, Semigroups, and Universal Algebra, NATO Science Series II. Mathematics, Physics and Chemistry - V. 207, pp. 241--272, Springer, 2005.Google ScholarGoogle Scholar

Index Terms

  1. Algebraic Approach to Verification and Testing of Distributed Applications

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          IECC '19: Proceedings of the 1st International Electronics Communication Conference
          July 2019
          163 pages
          ISBN:9781450371773
          DOI:10.1145/3343147

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 July 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader