You Li*a, Kaiyu Hou*b, Yunqi Hea, Yan Chena, and Hai Zhoua
aNorthwestern University�bAlibaba Cloud**
Property Guided Secure Configuration Space Search
ISC 2024, Arlington, VA
*Equal Contribution
**Any opinions, recommendations, or findings are those of the authors and do not reflect the
views of Alibaba Cloud.
Outline
2
Motivation: Configuration Verification
3
Drawbacks of Existing Methods
4
Secure Configuration Space
5
Secure Configuration Space
6
Advantages of Secure Configuration Space
7
Technical Contribution: Framework
8
Encode Configuration into State Space
9
Enlargement of Secure Configuration Space
10
Enlargement of Secure Configuration Space
11
Enlargement of Secure Configuration Space
12
Evaluation: Safety Properties
13
(a) Safe benchmarks: our algorithm (INCISE) achieves better coverage, e.g., larger safe configuration space than others on safe benchmarks.
(b) Unsafe benchmarks: INCISE still works on unsafe benchmarks, while the other algorithms cannot find a valid invariant.
Case Study: Cellular Emergency Protocols
14
You Li*a, Kaiyu Hou*b, Yunqi Hea, Yan Chena, and Hai Zhoua
aNorthwestern University�bAlibaba Cloud**
Thank you!