2005
DOI: 10.1007/978-3-540-30579-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Verifying Safety of a Token Coherence Implementation by Parametric Compositional Refinement

Abstract: Abstract. We combine compositional reasoning and reachability analysis to formally verify the safety of a recent cache coherence protocol. The protocol is a detailed implementation of token coherence, an approach that decouples correctness and performance. First, we present a formal and abstract specification that captures the safety substrate of token coherence, and highlights the symmetry in states of the cache controllers and contents of the messages they exchange. Then, we prove that this abstract specific… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…This gives us the option to leverage existing results on token coherence [4,5,12,16,25,26,27] in interesting ways. While the token cache coherence abstraction has these many nice properties, there are some road-blocks to its direct implementation in hardware.…”
Section: Analogy With Token Coherencementioning
confidence: 99%
“…This gives us the option to leverage existing results on token coherence [4,5,12,16,25,26,27] in interesting ways. While the token cache coherence abstraction has these many nice properties, there are some road-blocks to its direct implementation in hardware.…”
Section: Analogy With Token Coherencementioning
confidence: 99%
“…These invariants have been formally proven to guarantee coherence in the fault-free scenario [3], and their simplicity makes them attractive for online checking. Each cache controller can locally check Invariants 2 and 3 by performing a redundant token check for every load and store.…”
Section: Coherence State Signature For Single Blockmentioning
confidence: 99%
“…Methods like trace-driven or other simulationbased testing are insufficient for ensuring the correctness of such complex protocols since they often do not hit the difficult corner cases. Formal verification techniques have therefore been proposed and deployed to prove the correctness of these protocols [Abts et al 2000;Burckhardt et al 2005;Gjessing et al 1989;McMillan and J. 1991;Nanda and Bhuyan 1992;Park and Dill 1995;Pong et al 1998].…”
Section: Introductionmentioning
confidence: 99%
“…Although more advanced verification techniques exist, we chose Murϕ for its easy-to-use interface and robustness. Murϕ has also been the tool of choice for many hardware cache-related studies [Abts et al 2000;Burckhardt et al 2005;Park and Dill 1995;Pong et al 1998;Zhang et al 2010]. …”
Section: Introductionmentioning
confidence: 99%