1997
DOI: 10.1145/248621.248624
|View full text |Cite
|
Sign up to set email alerts
|

Verification techniques for cache coherence protocols

Abstract: In this article we present a comprehensive survey of various approaches for the verification of cache coherence protocols based on state enumeration, (symbolic) model checking, and symbolic state models. Since these techniques search the state space of the protocol exhaustively, the amount of memory required to manipulate the state information and the verification time grow very fast with the number of processors and the complexity of the protocol mechanisms. To be successful for systems of arbitrary complexit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0
1

Year Published

1998
1998
2014
2014

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(56 citation statements)
references
References 73 publications
0
55
0
1
Order By: Relevance
“…Different from the above, our method employs a specialized form of symmetry reduction and deals with the abstract transition system only and requires no annotations. Additionally, a number of works on combining abstraction and fairness, were presented in [6,22,29,4,25]. Our work explores one particular kind of abstraction and shows that it works with fairness with a simple twist.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Different from the above, our method employs a specialized form of symmetry reduction and deals with the abstract transition system only and requires no annotations. Additionally, a number of works on combining abstraction and fairness, were presented in [6,22,29,4,25]. Our work explores one particular kind of abstraction and shows that it works with fairness with a simple twist.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Two only caches and two only memory addresses can be seen as a too simplistic model. However, as Pong and Dubois wrote in [23] "several studies have demonstrated that most design errors can be found quickly in small-scale models, which suggests that this method [of state enumeration] is a useful debugging tool in the early design phase. "…”
Section: Level 1 Modelmentioning
confidence: 99%
“…These algorithms, however, do not synthesize network topologies. Reduced reachability analysis has been used in the verification of cache coherence protocols [11], using a global FSM model. We adopt a similar FSM model and extend it for our approach in this study.…”
Section: Related Workmentioning
confidence: 99%
“…the number of topologies synthesized, state transitions traversed and faults covered. We are also investigating complexity reduction techniques by introducing equivalence classes of states and topologies, using counting equivalence and repetition constructors [11].…”
Section: Summary and Future Workmentioning
confidence: 99%