2015
DOI: 10.1145/2775051.2677012
|View full text |Cite
|
Sign up to set email alerts
|

Proof Spaces for Unbounded Parallelism

Abstract: In this paper, we present a new approach to automatically verify multi-threaded programs which are executed by an unbounded number of threads running in parallel. The starting point for our work is the problem of how we can leverage existing automated verification technology for sequential programs (abstract interpretation, Craig interpolation, constraint solving, etc.) for multi-threaded programs. Suppose that we are given a correctness proof for a trace of a program (or for some other program fragment). We o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 44 publications
(49 reference statements)
0
15
0
Order By: Relevance
“…One future direction is to adapt this technique for practical program verification. In this context, adapting our technique within the automata-theoretic technique of [15,17,16,12,10] seems most promising. Second, there are several program verification techniques that use EPR, and in several of these, EPR is used mainly to establish a linear order on the universe [20].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…One future direction is to adapt this technique for practical program verification. In this context, adapting our technique within the automata-theoretic technique of [15,17,16,12,10] seems most promising. Second, there are several program verification techniques that use EPR, and in several of these, EPR is used mainly to establish a linear order on the universe [20].…”
Section: Discussionmentioning
confidence: 99%
“…A notable verification technique with an automata-theoretic foundation and that has been very effective in practice is that of trace abstraction due to Heizmann et al [15,16,17,10,11,12]. In this technique, one constructs iteratively regular sets that (incompletely) capture the set of all infeasible executions, eventually striving to cover all failing executions of a program, but handling complex theories such as arithmetic.…”
Section: Related Workmentioning
confidence: 99%
“…Similar to our SMT queries based on schemas, the inductive data flow graphs iDFG introduced in [24] are a succinct representations of schedules (they call them traces) for systems where the number of processes (or threads) is fixed. The work presented in [25] then considers parameterized verification. Further, our execution schemas are inspired by a general notion of semi-linear path schemas SLPS [45,46].…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…8-14: miscellaneous: 8-10 [24], 11 [15], 12 is the example from Sec. 2,[13][14] are the buggy and fixed versions of an Elevator controller [11].…”
Section: Empirical Evaluationmentioning
confidence: 99%
“…Our approach can be categorized as a cutoff detection technique [12,1,14,27]. Cutoffs are, however, typically determined statically, often leaving them too large for practical verification.…”
Section: Related Workmentioning
confidence: 99%