skip to main content
10.1145/2228360.2228424acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Proving correctness of regular expression accelerators

Published:03 June 2012Publication History

ABSTRACT

A popular technique in regular expression matching accelerators is to decompose a regular expression and communicate through instructions executed by a post-processor. We present a complete verification method that leverages the success of sequential equivalence checking (SEC) to proving correctness of the technique. The original regular expression and the system of decomposed regular expressions are modeled as net-lists and their equivalence is proved using SEC. SEC proves correct handling of 840 complex patterns from the Emerging Threats open rule set in 50 hours, eliminating altogether informal simulation and testing.

References

  1. Emerging Threats. http://www.emergingthreats.net/.Google ScholarGoogle Scholar
  2. PCRE - Perl Compatible Regular Expressions. http://www.pcre.org/.Google ScholarGoogle Scholar
  3. SNORT network intrusion detection system. http://www.snort.org/.Google ScholarGoogle Scholar
  4. J. Baumgartner, H. Mony, V. Paruthi, R. Kanzelman, and G. Janssen. Scalable sequential equivalence checking across arbitrary design transformations. In ICCD'06, pages 259--266, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  5. J. R. Burch, E. M. Clarke, K. L. McMillan, D. L. Dill, and L. J. Hwang. Symbolic model checking: 1020 states and beyond. Inf. Comput., 98:142--170, June 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. D. Gajski, N. D. Dutt, A. C.-H. Wu, and S. Y.-L. Lin. High-level synthesis: Introduction to Chip and System Design. Kluwer Academic Publishers, Norwell, MA, USA, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. E. Hopcroft, R. Motwani, and J. D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison Wesley, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Kumar, B. Chandrasekaran, J. Turner, and G. Varghese. Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia. In ANCS '07, pages 155--164. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K. McMillan. Interpolation and SAT-based model checking. In Computer Aided Verification, volume 2725 of Lecture Notes in Computer Science, pages 1--13. Springer Berlin/Heidelberg, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  10. H. Mony, J. Baumgartner, A. Mishchenko, and R. Brayton. Speculative reduction-based scalable redundancy identification. In DATE '09, pages 1674--1679, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Rohrer, K. Atasu, J. van Lunteren, and C. Hagleitner. Memory-efficient distribution of regular expressions for fast deep packet inspection. In CODES+ISSS, pages 147--154, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Smith, C. Estan, S. Jha, and S. Kong. Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. In SIGCOMM '08, pages 207--218. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Tan and T. Sherwood. A high throughput string matching architecture for intrusion detection and prevention. In ISCA '05, pages 112--122, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. Tuck, T. Sherwood, B. Calder, and G. Varghese. Deterministic memory-efficient string matching algorithms for intrusion detection. In IEEE Infocom, pages 2628--2639, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  15. J. van Lunteren. High-performance pattern-matching for intrusion detection. In INFOCOM 2006, pages 1--13, 2006.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Proving correctness of regular expression accelerators

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      DAC '12: Proceedings of the 49th Annual Design Automation Conference
      June 2012
      1357 pages
      ISBN:9781450311991
      DOI:10.1145/2228360

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 June 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,770of5,499submissions,32%

      Upcoming Conference

      DAC '24
      61st ACM/IEEE Design Automation Conference
      June 23 - 27, 2024
      San Francisco , CA , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader