2020
DOI: 10.1109/tse.2018.2864122
|View full text |Cite
|
Sign up to set email alerts
|

On Scheduling Constraint Abstraction for Multi-Threaded Program Verification

Abstract: Bounded model checking is among the most e cient techniques for the automatic veri cation of concurrent programs. However, encoding all possible interleavings o en requires a huge and complex formula, which signi cantly limits the salability. is paper proposes a novel and e cient abstraction re nement method for multi-threaded program veri cation. Observing that the huge formula is usually dominated by the exact encoding of the scheduling constraint, this paper proposes a scheduling constraint based abstractio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(12 citation statements)
references
References 55 publications
0
10
0
Order By: Relevance
“…About abstraction refinement, the scheduling constraint based abstraction refinement (SCAR) is an effective method for concurrent program verification [36]. SCAR is built on top of CBMC that is a bounded model checker for C and C++ programs.…”
Section: Related Workmentioning
confidence: 99%
“…About abstraction refinement, the scheduling constraint based abstraction refinement (SCAR) is an effective method for concurrent program verification [36]. SCAR is built on top of CBMC that is a bounded model checker for C and C++ programs.…”
Section: Related Workmentioning
confidence: 99%
“…Verification with a highly abstracted scheduling policy has been a main stream in research and practice of modelchecking multitasking programs [20], [27], [32], [38], [44], [47]. Works in this category assume arbitrary interleavings among tasks, but reduce verification complexity by either using partial-order reduction, limiting the number of context switches among tasks, or applying CEGAR [10], [47]. These approaches suffer from a high false-alarm rate and/or additional cost for refinements caused by allowing arbitrary sequences of task executions.…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, formal verification approaches for multitasking embedded software have mostly focused on the control logic separately from the OS [1], [13], [30], [35], [38]- [40], [45], [47], which often produces a large number of false alarms due to the over-approximation of the environment, including the operating system. For example, the application program shown in Figure 1 has a unique execution trace due to the scheduling decision from its underlying operating system.…”
Section: Introductionmentioning
confidence: 99%
“…The above traditional measurement methods describe the complexity of software from different aspects. All focus on analyzing the local structure and characteristics of functional individuals in the software system like classes, methods, etc., and lack a global measurement of software structure [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…The emergence of complex systems and complex networks [10][11][12][13], which emphasize a holistic approach to the system rather than focusing on local aspects, has provided a valuable perspective and a unique research dimension for understanding a software system. Unlike the traditional "reduction method" used in software development, the complex system theory emphasizes the global features of a system.…”
Section: Introductionmentioning
confidence: 99%