DOI: 10.1007/978-3-540-70545-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Effective Program Verification for Relaxed Memory Models

Abstract: Program verification for relaxed memory models is hard. The high degree of nondeterminism in such models challenges standard verification techniques. This paper proposes a new verification technique for the most common relaxation, store buffers. Crucial to this technique is the observation that all programmers, including those who use low-lock techniques for performance, expect their programs to be sequentially consistent. We first present a monitor algorithm that can detect the presence of program executions … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
97
0

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 120 publications
(97 citation statements)
references
References 18 publications
0
97
0
Order By: Relevance
“…These are widespread medium-sized benchmarks that are used by many tools for analyzing concurrent programs running under weak memory models (e.g. [24,12,15,10,40,2,37,13,3,8,22,7,4,14]). We divide our results in two sets.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…These are widespread medium-sized benchmarks that are used by many tools for analyzing concurrent programs running under weak memory models (e.g. [24,12,15,10,40,2,37,13,3,8,22,7,4,14]). We divide our results in two sets.…”
Section: Resultsmentioning
confidence: 99%
“…There has been a lot of work on automatic program verification under weak memory models, based on precise, under-approximate, and abstract analyses, e.g., [29,23,24,12,36,37,18,5,8,15,16,13,14,39,2,40,20,10,38,26,19]. While most of these works concern TSO, only a few of them address the safety verification problem under POWER (e.g., [6,10,36,9,11]).…”
Section: Introductionmentioning
confidence: 99%
“…The second case study for our technique was debugging the axiomatic specification of TSO used by SOBER [5]. SOBER is a technique for detecting potential SC violations in software.…”
Section: Debugging the Axiomatic Specification Of Tso Used In Sobermentioning
confidence: 99%
“…SOBER uses an axiomatically defined memory model that is intended to be equivalent to SPARC's TSO. The authors stated that their axiomatic definition is equivalent to their operational specification of TSO [6]. However, Burnim et al [7] discovered that SOBER's axiomatic specification and TSO are, in fact, not equivalent.…”
Section: Debugging the Axiomatic Specification Of Tso Used In Sobermentioning
confidence: 99%
See 1 more Smart Citation