2000
DOI: 10.1007/10722167_8
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Verification of Parameterized Cache Coherence Protocols

Abstract: We propose a new method for the verification of parameterized cache coherence protocols. Cache coherence protocols are used to maintain data consistency in multiprocessor systems equipped with local fast caches. In our approach we use arithmetic constraints to model possibly infinite sets of global states of a multiprocessor system with many identical caches. In preliminary experiments using symbolic model checkers for infinite-state systems based on real arithmetics (HyTech [HHW97] and DMC [DP99]) we have aut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

2
176
0

Year Published

2003
2003
2009
2009

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 146 publications
(178 citation statements)
references
References 28 publications
2
176
0
Order By: Relevance
“…Moreover [14,16,21] do not report experimental results for cache protocols. In [8], Delzanno uses arithmetical constraints to model global states of systems with many identical caches. His method uses invariant checking via backward reachability analysis of [1] and provides a broad framework for reasoning about cache coherence protocols but his procedure does not terminate on some examples.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover [14,16,21] do not report experimental results for cache protocols. In [8], Delzanno uses arithmetical constraints to model global states of systems with many identical caches. His method uses invariant checking via backward reachability analysis of [1] and provides a broad framework for reasoning about cache coherence protocols but his procedure does not terminate on some examples.…”
Section: Discussionmentioning
confidence: 99%
“…More recently, a decision procedure based on a modification of the backward reachability algorithm that guarantees termination for all snoopy cache protocols has been given in [12]. However, the backward reachability algorithm of [1] that [8,12,16], make use of, although general, suffers from the handicap that the best known bound for its running time is not known to be primitive recursive. Furthermore, this technique does not provide a way to generate error traces when a bug is detected.…”
Section: Discussionmentioning
confidence: 99%
“…Since parameterized systems contain process types with large number of behaviorally similar processes (whose behavior follows a local finite state machine or FSM), a natural state space abstraction is to group the processes based on which state of the local FSM they reside in [23,7,24]. Thus, instead of saying "process 1 is in state s, process 2 is in state t and process 3 is in state s" -we simply say "2 processes are in state s and 1 is in state t".…”
Section: Introductionmentioning
confidence: 99%
“…This case study is the verification of parameterized mutual exclusion protocol, which was used as a running example in [2]. The protocol is specified as a parameterized system of finite automata arranged in the linear array.We conclude with a general claim of relative completeness of the proposed method with respect to the verification methods presented in [1,4,2]. In the ongoing work we aim to formally support this claim.…”
mentioning
confidence: 52%
“…We conclude with a general claim of relative completeness of the proposed method with respect to the verification methods presented in [1,4,2]. In the ongoing work we aim to formally support this claim.…”
mentioning
confidence: 52%