[Home] [CV] [Publications]


Minus 1a5aa4f1c08b567c9107cba729de26bc87c17ab2b2f690eb45059193a1d6f587 Analyzing BGP Gadgets in Maude
Wang, Anduo and Talcott, Carolyn L. and Jia, Limin and Loo, Boon Thau and Scedrov, Andre - 2011 - PDF

AnalyzingBorderGatewayProtocol(BGP)instancesisacrucialstep in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Researchers study the instances by manually con- structing execution sequences, hoping to either identify an oscillation or show that the instance is safe by exhaustively examining all possible sequences. We propose to automate the analysis by using Maude, a tool based on rewriting logic. We have developed a library specifying a generalized path vector protocol, and methods to instantiate the library with customized routing policies. Protocols can be analyzed automatically by Maude, once users provide specifications of the network topology and routing policies. Using our Maude library, protocols or policies can be easily specified and checked for problems. To validate our ap- proach, we performed safety analysis of well-known BGP instances and actual routing configurations.