Proceedings of the 17th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, Tools, and Theory for Embedded Systems 2016
DOI: 10.1145/2907950.2907961
|View full text |Cite
|
Sign up to set email alerts
|

TIC: a scalable model checking based approach to WCET estimation

Abstract: The application of Model Checking to compute WCET has not been explored as much as Integer Linear Programming (ILP), primarily because model checkers fail to scale for complex programs. These programs have loops with large or unknown bounds, leading to a state space explosion that model checkers cannot handle. To overcome this, we have developed a technique, TIC, that employs slicing, loop acceleration and over-approximation on timeannotated source code, enabling Model Checking to scale better for WCET computa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Possible improvements over this include: i) encoding some of the functional semantics of the program into the modelchecking problem [13,4] ii) using "trace partitioning" [18] or "path focusing" [14] in the abstract-interpretation phase.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Possible improvements over this include: i) encoding some of the functional semantics of the program into the modelchecking problem [13,4] ii) using "trace partitioning" [18] or "path focusing" [14] in the abstract-interpretation phase.…”
Section: Discussionmentioning
confidence: 99%
“…Metta et al [13] also employ model checking to increase the precision of WCET analysis. However, they do not take into account low-level features such as caches.…”
Section: Related Workmentioning
confidence: 99%
“…There are also techniques for improving the accuracy of cache analysis, e.g., by using symbolic execution or model checking to refine the cache analysis results [13,40,56] and by extending the analysis from single-core to multi-core CPUs [38]. However, none of these techniques considered speculative execution, which is the focus of our work.…”
Section: Related Workmentioning
confidence: 99%
“…The DOD relation is important (together with NTSCD) when we want to slice possibly non-terminating programs with irreducible control flow graphs and preserve their termination properties as well as data integrity [1,33]. This is a common requirement when slicing is used as a preprocessing step before program verification [9,23,26], worst-case execution time analysis [29], information flow analysis [18,19], analysis of concurrent programs [18] with busy-waiting synchronization or synchronization where possible spurious wake-ups of threads are guarded by loops (e.g., programs using the pthread library), and analysis of reactive systems and generic state-based models [2,24,33]. The DOD relation is studied in Sect.…”
Section: Introductionmentioning
confidence: 99%