2007
DOI: 10.1016/j.entcs.2007.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Interrupt Verification via Thread Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(25 citation statements)
references
References 13 publications
0
25
0
Order By: Relevance
“…Therefore, in our POEG, we assume that two thread segments and , respectively, from two different threads and are always concurrent unless they are ordered by a task ordering edge or one of them is disabled by the other one. The nesC language [21] contains a static data race detector that however is still unsound since it cannot follow pointers [12,21,22]. Thus, the data races presented in Figure 1 cannot be reported by the native nesC data race detector.…”
Section: Definition 1 (Poeg)mentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, in our POEG, we assume that two thread segments and , respectively, from two different threads and are always concurrent unless they are ordered by a task ordering edge or one of them is disabled by the other one. The nesC language [21] contains a static data race detector that however is still unsound since it cannot follow pointers [12,21,22]. Thus, the data races presented in Figure 1 cannot be reported by the native nesC data race detector.…”
Section: Definition 1 (Poeg)mentioning
confidence: 99%
“…However, on-the-fly techniques still suffer from the high runtime overhead they incur. Dynamic analysis methods can be a good complement to static analysis methods [21,22] since they guarantee to isolate real data races in a particular execution instance of a program given an input from the potential data races reported by static analysis.…”
Section: Introductionmentioning
confidence: 99%
“…Previous research on formal verification of interrupt-driven programs uses a range of techniques, including program transformation [Kidd et al 2010;Regehr and Cooprider 2007;Wu et al 2013], explicit-state model checking [Schlich et al 2009], bounded model checking [Bucur and Kwiatkowska 2011;Li et al 2013] and predicate abstraction [Witkowski et al 2007]. None of these methods demonstrates effective verification of programs of moderate size with nested interrupts.…”
Section: Related Workmentioning
confidence: 99%
“…The second source-to-source transformation we use for comparison generates multithreaded code and was suggested by Regehr and Cooprider [2007]. This method verifies program properties for specific, user-defined interrupt arrival scenarios, rather than modelling all possible patterns of interrupt arrival.…”
Section: Modelling Interrupts With Threadsmentioning
confidence: 99%
See 1 more Smart Citation