2011
DOI: 10.1007/s10703-011-0124-2
|View full text |Cite
|
Sign up to set email alerts
|

Automatic analysis of DMA races using model checking and k-induction

Abstract: Modern multicore processors, such as the Cell Broadband Engine, achieve high performance by equipping accelerator cores with small "scratch-pad" memories. The price for increased performance is higher programming complexity -the programmer must manually orchestrate data movement using direct memory access (DMA) operations. Programming using asynchronous DMA operations is error-prone, and DMA races can lead to nondeterministic bugs which are hard to reproduce and fix. We present a method for DMA race analysis i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 22 publications
(28 citation statements)
references
References 47 publications
0
28
0
Order By: Relevance
“…Recently, kinduction has also been applied in the verification of imperative software [12,13]. In this paper, we consider applying the software formulation of k-induction proposed in [12,13] to detect mutant equivalence in the C programs generated via the technique described in Sect. 2.3.…”
Section: Detection Of Equivalent Mutants Using K-inductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, kinduction has also been applied in the verification of imperative software [12,13]. In this paper, we consider applying the software formulation of k-induction proposed in [12,13] to detect mutant equivalence in the C programs generated via the technique described in Sect. 2.3.…”
Section: Detection Of Equivalent Mutants Using K-inductionmentioning
confidence: 99%
“…In prior work [12,13] we investigated a direct lifting of k-induction from transition systems to the level of program loops, in order to prove partial correctness of software programs with respect to assertions appearing in the program text. Because we translate Simulink designs into C, it is this formulation of kinduction, rather than the transition system-level formulation outlined in §3.1 and §3.2, that we use to implement k-induction for detection of equivalent mutants.…”
Section: K-induction For Software Programsmentioning
confidence: 99%
See 1 more Smart Citation
“…Bounded model checking tools such as CBMC [21] and F-SOFT [35] are effective at finding bugs in system-level software, and have been applied in the automotive domain [41]. Recent applications of the kinduction method [43] to software verification [25] have facilitated the use of BMC for verification, not just falsification, of race-freedom properties in software for the Cell BE processor [27].…”
Section: Introductionmentioning
confidence: 99%
“…To avoid quantifiers and the associated theorem proving burden, we originally devised a non-deterministic representation of sets [8], based on [17]. Let s and t denote the arbitrary threads considered by the two-thread reduction.…”
mentioning
confidence: 99%