Proceedings of the 2021 ACM SIGCOMM 2021 Conference 2021
DOI: 10.1145/3452296.3472910
|View full text |Cite
|
Sign up to set email alerts
|

Semi-automated protocol disambiguation and code generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…Implementation Extraction. Yen et al [56] explored the use of NLP techniques to map RFCs to protocol implementations. To do this, they manually engineer an existing semantic parser to handle networking-specific vocabulary, and translate individual sentences to logical forms that can then be mapped to executable functions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Implementation Extraction. Yen et al [56] explored the use of NLP techniques to map RFCs to protocol implementations. To do this, they manually engineer an existing semantic parser to handle networking-specific vocabulary, and translate individual sentences to logical forms that can then be mapped to executable functions.…”
Section: Related Workmentioning
confidence: 99%
“…Canonical FSMs are created based not only on RFCs but also on input from experts with exposure to protocol implementations, and often also rely on analyzing the code [22], [57], [58]. RFCs contain ambiguities, unspecified behaviors that human experts solve in creating the Canonical FSM [16], [56], or simply missing information. Thus, unlike traditional NLP semantic parsing problems [59], [60], [24], which study methods for translating natural language into a complete formal representation, in our setting there is not a complete one-to-one translation between the text and the FSM.…”
Section: Limitationsmentioning
confidence: 99%
“…Finally, thinking about synthesis in a broader sense, it is worth mentioning that similar formal methods have been used to programmatically (i) generate protocol code (but not configurations) from RFC requirements [25], and (ii) specifications from lower-level axiomatic requirements [26].…”
Section: Current State Of the Art In Network Configurationmentioning
confidence: 99%
“…Finally, we point out that relevant work targeting the synthesis of networkrelated software (but not network-related configurations) recently started to appear, with e.g., NLP techniques applied to text of IETF Request For Comments (RFC) normative documents for the sake of either auto-discovering and fixing ambiguities [42] or automatically generating protocol implementations [25].…”
Section: Code Synthesismentioning
confidence: 99%
“…• Similarities of downstream tasks: First, similar to the status in NLP prior to the emergence of foundational models, specific solutions with their own preprocessing, features extraction, architectures, and datasets, are currently being developed for different tasks (e.g., congestion control [1,24,90], adaptive bitrate streaming [50], datacenter-scale automatic traffic optimization [7], job scheduling [31,51,51], resource management [65,91,99], network planning [104], packet classification [39], performance prediction [49], congestion prediction [56], performance estimation [100], malware detection [29,93], mapping from a low-quality video to a high-quality version [96], or semi-automated generation of protocol implementations from specification text [95].) Next, we observe that most of the underlying adopted machine learning approach behind those solutions (e.g., classification, anomaly detection, generator, and reinforcement learning) are areas where foundational models have been successfully applied, or being explored (Section 3.1).…”
Section: Introductionmentioning
confidence: 99%