1995
DOI: 10.1007/3-540-60385-9_2
|View full text |Cite
|
Sign up to set email alerts
|

Automatic verification of the SCI cache coherence protocol

Abstract: This paper describes an ongoing effort to verify the cache coherence protocol of the IEEE/ANSI Standard for Scalable Coherent Interface using the Murky verification system. A model of the typical set protocol was constructed in the Mur~ description language. This model was augmented with a specification of properties necessary for cache coherence. The Mur~ verification system automatically checks if all reachable states in the model satisfy the given specification. Although verification is still under way, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

1995
1995
2020
2020

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 11 publications
0
24
0
Order By: Relevance
“…Most works [4,6,7,9,12,16,18,20,21] concern elaborated protocols using more complex topologies than the fully connected snoop topology of our LNT model. The principal differences to our work are that we focus on a generic interconnect that includes the behavior of all correct implementations and that we study a heterogeneous SoC, rather than verifying a particular coherency protocol for a homogeneous system.…”
Section: Related Workmentioning
confidence: 99%
“…Most works [4,6,7,9,12,16,18,20,21] concern elaborated protocols using more complex topologies than the fully connected snoop topology of our LNT model. The principal differences to our work are that we focus on a generic interconnect that includes the behavior of all correct implementations and that we study a heterogeneous SoC, rather than verifying a particular coherency protocol for a homogeneous system.…”
Section: Related Workmentioning
confidence: 99%
“…Detection of memory bugs also can be performed statically by utilizing explicit model checking [17,33] and program analysis [2,6,8]. As software becomes more complex and diverse, users increasingly rely on run-time bug detection by instrumenting the code with checks, such as in Purify [26], Valgrind [30,31], Intel thread checker [11], DIDUCE [9], Eraser [29], CCured [18], and others [1,4,15,22,23].…”
Section: Related Workmentioning
confidence: 99%
“…The effectiveness of aggregation is shown by the example we present below: FLASH is the most complex multiprocessor cache coherence protocol that has been formally verified using a theorem-prover. [31], [5], [40], [32], [17], [19]. These methods suffer from the state explosion problem: the number of states for nontrivial numbers of processors and cache lines is very large.…”
Section: Basic Ideamentioning
confidence: 99%